共 10 条
- [1] [Anonymous], KDD Cup 1999 Data
- [2] Cantú-Paz E, 2004, LECT NOTES COMPUT SC, V3102, P959
- [3] Chen You, 2007, Journal of Software, V18, P1639, DOI 10.1360/jos181639
- [4] Hofmeyr SA, 1999, GECCO-99: PROCEEDINGS OF THE GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, P1289
- [5] Architecture for an Artificial Immune System [J]. EVOLUTIONARY COMPUTATION, 2000, 8 (04) : 443 - 473
- [6] Hou H., 2005, Proceedings of the ACM Symposium on Applied Computing, V2, P952
- [8] Köppen M, 2001, IEEE C EVOL COMPUTAT, P867, DOI 10.1109/CEC.2001.934281
- [9] Su Purui, 2003, J SOFTWARE, V14, P1122
- [10] Ensemble approach to intrusion detection based on improved multi-objective genetic algorithm [J]. Ruan Jian Xue Bao, 2007, 6 (1369-1378): : 1369 - 1378