共 30 条
- [1] Protocol analysis in intrusion detection using decision tree [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 404 - 408
- [2] [Anonymous], INTERNET ENCY
- [3] An architecture for intrusion detection using Autonomous Agents [J]. 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 13 - 24
- [4] Bellifemine FL, 2007, DEV MULTIAGENT SYSTE
- [5] BYUNGJOO K, 2005, 4 ANN ACIS INT C COM, P13
- [6] *CERT, 2007, CERT STAT
- [7] Preemptive distributed intrusion detection using mobile agents [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 103 - 108
- [8] CROSBIE M, 1995, APPLYING GENETING PR
- [9] DIPANKAR D, 2006, COMPUTATIONAL INTELL, V1, P40
- [10] El-Semary A, 2005, IEEE INT CONF FUZZY, P325