共 28 条
[3]
[Anonymous], 2000, ACM SIGKDD EXPLORATI, DOI DOI 10.1145/846183.846201
[4]
Bivens A., 2002, P INT ENG SYST ART N, V12, P579
[6]
Dastanpour Amin, 2014, International Conference on Computer Security and Digital Investigation (ComSec2014), P1
[7]
Dastanpour Amin, 2013, The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), P169
[8]
Dhopte S., GENETIC ALGORITHM IN
[9]
Towards Intrusion Detection for Encrypted Networks
[J].
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2,
2009,
:540-545
[10]
Gupta P, 2011, COMM COM INF SC, V198, P122