共 10 条
[1]
Anderson James P., 1980, TECHNICAL REPORT, P98
[2]
[Anonymous], 2009, P 2009 IEEE S COMP I
[3]
Blake C. L., 1998, Uci repository of machine learning databases
[5]
Gupta Kapil Kumar, 2010, IEEE Trans. On Dependable and Secure Computing, V7
[6]
Hoque Mohammad Sazzadul, 2012, INT J NETWORK SECURI, V4
[7]
Lakhina S., 2010, INT J ENG SCI TECHNO, V2, P1790
[8]
Ning P., INTRUSION DETECTION
[9]
Srinivasulu P., 2010, INT J ADV SOFT COMPU, V2
[10]
Upendra, 2012, INT J SCI RES PUBLIC, V2