共 18 条
[1]
[Anonymous], APPL COMPUT INTELL S
[2]
[Anonymous], 2004, Intrusion detection and correlation: challenges and solutions
[3]
BORJI A, 2007, P ANN AS COMP SCI C, V4846, P254
[4]
Freund Y., 1996, Machine Learning. Proceedings of the Thirteenth International Conference (ICML '96), P148
[5]
Govindarajan M., 2012, P WORLD C ENG COMP S, V1, P459
[6]
HU W, 2005, P IEEE WIC ACM INT C, P712
[7]
Mokarian A, 2013, INT J COMPUT SCI NET, V13, P128
[8]
Natesan P., 2012, J INFORM COMPUTATION, V8, P2239
[9]
Prusti D., 2015, An efficient intrusion detection model using ensemble methods
[10]
Schapire R. E., 2013, Empirical Inference, P37, DOI [DOI 10.1007/978-3-642-41136-65, 10.1007/978-3-642-41136-65, DOI 10.1007/978-3-642-41136-6_5]