共 11 条
[1]
Cai Zhong-Min, 2003, Chinese Journal of Computers, V26, P361
[3]
Huang Li-ming, 2009, Computer Engineering and Design, V30, P1987
[4]
Training a neural-network based intrusion detector to recognize novel attacks
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS,
2001, 31 (04)
:294-299
[5]
LI T, 2005, SCI CHINA SER E, V8, P798
[7]
SIMON P, 1995, J EXPT THEORETICAL A, V7, P175
[9]
Yan Qiao, 2005, Chinese Journal of Computers, V28, P1601
[10]
[于海燕 YU Hai-Yan], 2009, [模式识别与人工智能, Pattern Recognition and Artificial Intelligence], V22, P305