共 50 条
[21]
Using data correlation to build an intrusion detection system
[J].
RECENT ADVANCES IN AUTOMATION & INFORMATION: PROCEEDINGS OF THE 10TH WSEAS INTERNATIONAL CONFERENCE ON AUTOMATION & INFORMATION (ICAI'09),
2009,
:342-+
[22]
Intrusion Detection System Using FKNN and Improved PSO
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2021, 67 (02)
:1429-1445
[23]
Intrusion Detection System using Fuzzy Genetic Algorithm
[J].
2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC),
2015,
[24]
Intrusion Detection System for Applications Using Linux Containers
[J].
SECURITY AND TRUST MANAGEMENT (STM 2015),
2015, 9331
:123-135
[25]
Intrusion Detection System using Bagging Ensemble Selection
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH),
2015,
:4-7
[26]
An advanced method for detection of botnet traffic using Intrusion Detection System
[J].
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT),
2017,
:481-485
[28]
Mining a Ubiquitous Time and Attendance Schema using Random Forests for Intrusion detection
[J].
INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015),
2016, 24
:1226-1231
[30]
Research on network intrusion detection method of power system based on random forest algorithm
[J].
2021 13TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2021),
2021,
:374-379