共 10 条
[1]
[Anonymous], 1999, KDD CUP 99 TASK DESC
[2]
Quantitative hierarchical threat evaluation model for network security
[J].
Ruan Jian Xue Bao,
2006, 4 (885-897)
:885-897
[3]
Han JW, 2000, SIGMOD RECORD, V29, P1
[4]
Hu W, 2006, WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, P4747
[5]
Huiqiang Wang, 2007, 2007 Second International Multisymposium on Computer and Computational Sciences - IMSCCS '07, P352
[6]
Lai JB, 2006, 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, P1545
[7]
Liu Mixia, 2008, 2008 Workshop on Knowledge Discovery and Data Mining (WKDD '08), P542, DOI 10.1109/WKDD.2008.35
[8]
Mika K., 1999, KNOWLEDGE DISCOVERY
[9]
Siraj Ambareen., 2006, A Unified Alert Fusion Model for Intelligent Analysis of Sensor Data in an Intrusion Detection Environment
[10]
Yong Z, 2007, CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, P768