共 11 条
[1]
[Anonymous], P IEEE S SEC PRIV
[2]
Laskov P, 2005, LECT NOTES COMPUT SC, V3617, P50, DOI 10.1007/11553595_6
[3]
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[4]
Li Wei, 2004, P US DOE CYB C KAN C
[5]
Genetic algorithms with dynamic niche sharing for multimodal function optimization
[J].
1996 IEEE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION (ICEC '96), PROCEEDINGS OF,
1996,
:786-791
[6]
Intrusion detection using neural networks and support vector machines
[J].
PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3,
2002,
:1702-1707
[7]
Rogova Galina L, REINFORCEMENT LEARNI
[8]
Sinclair C., 1999, P 15 ANN COMP SEC AP
[9]
Intrusion detection by machine learning: A review
[J].
EXPERT SYSTEMS WITH APPLICATIONS,
2009, 36 (10)
:11994-12000
[10]
WEKA, 2008, DAT MIN MACH LEARN S