共 24 条
[1]
A selection criteria for intrusion detection systems
[J].
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
1998,
:280-288
[2]
[Anonymous], 2004, INTRUSION DETECTION
[3]
[Anonymous], P NAT INF SYST SEC C
[4]
[Anonymous], 2002, ADV INF SECUR
[5]
Analysis of distributed intrusion detection systems using Bayesian methods
[J].
CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE,
2002,
:329-334
[6]
Adaptive neuro-fuzzy intrusion detection systems
[J].
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS,
2004,
:70-74
[8]
FREUND Y, 1997, P 13 INT C MACH LEAR, P148
[9]
Freund Y, 1996, ICML