共 38 条
- [1] [Anonymous], 2000, MULTIPLE SELF ORG MA
- [2] [Anonymous], WIRED
- [3] [Anonymous], THESIS POLITECNICO M
- [4] Incorporating soft computing techniques into a probabilistic intrusion detection system [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2002, 32 (02): : 154 - 160
- [6] Cooke Evan, 2005, STEPS RED UNW TRAFF
- [7] Real-time anomaly detection using soft-computing techniques [J]. IEEE SOUTHEASTCON 2001: ENGINEERING THE FUTURE, PROCEEDINGS, 2001, : 105 - 108
- [8] DAGON D, 2008, ADV INFORM SECURITY, P143
- [9] Denning D. E., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P118