共 39 条
[1]
Alfonso Valdes, 1995, TECHNICAL REPORT
[2]
Alharby A, 2005, LECT NOTES COMPUT SC, V3531, P192
[3]
Aly M., 2005, Survey on Multiclass Classification Methods Extensible algorithms, V19, P2
[4]
[Anonymous], 2012, Internet security threat report, V17
[5]
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[6]
Bolzoni D, 2007, USENIX ASSOCIATION PROCEEDING OF THE 21ST LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, P141
[7]
Chiu CY, 2010, LECT NOTES ARTIF INT, V6171, P595, DOI 10.1007/978-3-642-14400-4_46
[8]
Geramiraz Farzaneh, 2012, International Journal of Network Security, V14, P352
[9]
Detecting anomalous and unknown intrusions against programs
[J].
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
1998,
:259-267
[10]
Goel Radhika, 2012, INT J NETWORK SECURI, V14, P211