共 128 条
[22]
Delgosha F., 2006, PROC 25 IEEE INT C C, P1
[24]
Eid Heba F., 2010, Proceedings 10th International Conference on Intelligent Systems Design and Applications (ISDA 2010), P363, DOI 10.1109/ISDA.2010.5687239
[25]
Falke A. D., 2014, INT J SCI RES ED, V2, P101
[26]
FARAOUN K, 2007, INT ARAB J INF TECHN, V4, P237
[27]
Mining network data for intrusion detection through combining SVMs with ant colony networks
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2014, 37
:127-140
[29]
Fogla P., 2006, P 13 ACM C COMP COMM, P59, DOI 10.1145/1180405.1180414
[30]
Evaluation of intrusion detectors: A decision theory approach
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:50-61