共 23 条
- [1] Abraham A., Grosan C., Martin-Vide C., Evolutionary design of intrusion detection programs, Int J Netw Secur, 4, 3, pp. 328-339, (2007)
- [2] Aggarwal C., Zhai C., A survey of text classification algorithms, Mining Text Data, pp. 163-222, (2012)
- [3] Anderson J., Computer security threat monitoring and surveillance, Technical report, (1980)
- [4] Barbhuiya F., Et al., An active host-based intrusion detection system for ARP-related attacks and its verification, Int J Net Sec App, 3, 3, pp. 163-180, (2011)
- [5] Cai L., Chen J., Ke Y., Chen T., Li Z., A new data normalization method for unsupervised anomaly intrusion detection, J Zhejiang Uni-SCI C, 11, 10, pp. 778-784, (2010)
- [6] Denning D., An intrusion detection model, IEEE Trans Soft Eng, 13, 2, pp. 222-232, (1987)
- [7] Deshpande P., Sharma S., Kumar S., Implementation of a private cloud: a case study, Adv Int Sys Comp, 259, 2, pp. 635-648, (2013)
- [8] Doelitzscher F., Et al., An agent based business aware incident detection system for cloud environments, J Cloud Comp Adv Sys App, 1, (2012)
- [9] Fawcett T., An introduction to ROC analysis, Patt Recog Lett, 27, pp. 861-874, (2006)
- [10] Forrest S., Hofmeyr A., Somayaji A., Longsta T., A sense of self for Unix processes, pp. 120-128, (1996)