共 11 条
[1]
Aparicio-Navarro Francisco J., 2013, International Journal of Internet Technology and Secured Transactions, V5, P42, DOI 10.1504/IJITST.2013.058294
[4]
A New Data-Mining Based Approach for Network Intrusion Detection
[J].
2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE,
2009,
:372-377
[6]
Eskin Eleazar, 2002, APPL DATA MINING COM, V6, P77, DOI DOI 10.1007/978-1-4615-0953-0_4
[7]
Fan J., 2009, THESIS LOUGHBOROUGH
[9]
Laskov P, 2005, LECT NOTES COMPUT SC, V3617, P50, DOI 10.1007/11553595_6
[10]
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection
[J].
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS,
2010,
:17-24