共 74 条
[11]
Bolzoni D, 2009, LECT NOTES COMPUT SC, V5758, P1, DOI 10.1007/978-3-642-04342-0_1
[14]
CHEN CM, 2009, NETWORKS COMMUNICATI, P358
[15]
Cova M, 2010, P 19 INT C WORLD WID, P281, DOI DOI 10.1145/1772690.1772720
[16]
Dhamankar R., 2009, The top cyber security risks
[17]
Fuzzy network profiling for intrusion detection
[J].
PEACHFUZZ 2000 : 19TH INTERNATIONAL CONFERENCE OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS,
2000,
:301-306
[18]
Dokas, 2004, NEXT GENERATION DATA
[19]
Early JP, 2006, ADV INFO KNOW PROC, P107
[20]
Estevez-Tapiador JM, 2003, IWIA 2003: FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, P3