共 12 条
- [1] Brutlag JD, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P139
- [2] Chen Y, 2006, LECT NOTES COMPUT SC, V4318, P153
- [3] Building lightweight intrusion detection system based on principal component analysis and C4.5 algorithm [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 2109 - +
- [4] DAGUPTA D, 2002, IEEE T EVOLUTIONARY, V6, P28
- [5] Hecht-Nielsen R., 1989, IJCNN: International Joint Conference on Neural Networks (Cat. No.89CH2765-6), P593, DOI 10.1109/IJCNN.1989.118638
- [6] Hyvaerinen A., 2001, INDEPENDENT COMPONEN
- [7] Stateful intrusion detection for high-speed networks [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 285 - 293
- [8] Li Y., 2006, Communication Technology, P1, DOI DOI 10.1109/ICR.2006.343404
- [9] Prasad M, 2004, PROCEEDINGS OF THE 2004 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE, P427
- [10] ROESCH M, 1999, P 13 SYST ADM C LISA