共 12 条
[1]
Beal V., 2005, INTRUSION DETECTION
[2]
Borah S., 2014, INT J COMPUTER APPL, V90, P15
[3]
Borah S, 2011, COMM COM INF SC, V192, P35
[4]
Dutt I., 2016, INT J COMPUT APPL, V144, P19
[5]
El Moussaid N., INT J ELECT COMPUT S, V2, P1059
[6]
Kayacik H.G., 2005, P 3 ANN C PRIV SEC T, VVolume 94, P1722
[7]
Kazienko P., 2003, INTRUSION DETECTIO 1
[8]
Luo N., 2008, SPRINGER ROUGH SETS
[9]
MacQueen J., 1967, BERK S MATH STAT PRO, V5, P281, DOI DOI 10.1007/S11665-016-2173-6
[10]
Olusola AA, 2010, LECT NOTES ENG COMP, P162