共 19 条
[11]
Lee S.C., 2002, SYSTEMS MAN CYBERN A, V31, p294
[12]
Lee W, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P89, DOI 10.1109/DISCEX.2001.932195
[13]
Michalik P, 2013, LINDI 2013, P99
[14]
Intrusion detection using neural networks and support vector machines
[J].
PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3,
2002,
:1702-1707
[15]
Application of Change Point Outlier Detection Methods in Real Time Intrusion Detection
[J].
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT),
2012,
:110-115
[16]
A Design and Implementation of Intrusion Detection System by using Data Mining
[J].
2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT),
2014,
:700-704
[17]
XiaoHang Yao, 2010, 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies (EDT), P402, DOI 10.1109/EDT.2010.5496548
[18]
Yue F., 2012, APPL IS MORE HEADER
[19]
Zhe L., 2012, CLOUD COMPUTING INTE, P75