共 313 条
[1]
Ontology-based Distributed Intrusion Detection System
[J].
2009 14TH INTERNATIONAL COMPUTER CONFERENCE,
2009,
:65-+
[2]
Visualizing network data for intrusion detection
[J].
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP,
2005,
:100-108
[3]
Abouzakhar NS, 2003, P POSTGRADUATE NETW
[4]
Adetunmbi A.O., 2008, International Journal of Computing and ICT Research, V2, P60
[5]
Agrawal R., 1994, P 20 INT C VER LARG, V1215, P487, DOI DOI 10.5555/645920.672836
[6]
Agrawal Rakesh., 1993, P 1993 ACM SIGMOD IN, P207, DOI DOI 10.1145/170035.170072
[7]
Host Based Intrusion Detection Using RBF Neural Networks
[J].
ICET: 2009 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS,
2009,
:48-51
[8]
Al-Subaie M, 2006, P INT COMP SOFTW APP, P325
[9]
Albayrak S., 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06), V2, P123, DOI 10.1109/CIMCA.2005.1631456