共 13 条
[1]
Cai Jian, 2005, RES IMPLEMENTATION I
[2]
Chen Yu-hui, 2010, STUDY INTRUSION DETE
[3]
Chinrungrueng C., 2002, OPTIMAL ADAPTIVE K M
[4]
Jian-ping Zhang, 2007, Application Research of Computers, V24, P166
[5]
Li Yang, 2007, Computer Engineering, V33, P154
[6]
[马晓春 Ma Xiaochun], 2005, [微电子学与计算机, Microelectronics & Computer], V22, P134
[7]
Sun Ying, 2010, COMPUTER KNOWLEDGE T, P6463
[8]
Intrusion detection techniques and approaches
[J].
COMPUTER COMMUNICATIONS,
2002, 25 (15)
:1356-1365
[9]
Wang Yan, 2010, RES APPL DATA MINING, DOI Anhui
[10]
Wu Tao, 2010, RES INTRUSION DETECT