共 17 条
- [1] Kolias C(2013)Attacks and countermeasures on 802.16: analysis and assessment Commun. Surv. Tutor. IEEE 15 487-514
- [2] Kambourakis G(2013)Lte/sae security issues on 4g wireless networks Secur. Priv. IEEE 11 55-62
- [3] Gritzalis S(2013)Scaling up classification rule induction through parallel processing Knowl. Eng. Rev. 28 451-478
- [4] Bikos AN(2002)Data mining with an ant colony optimization algorithm IEEE Trans. Evolut. Comput. 6 321-332
- [5] Sklavos N(2009)Anomaly-based network intrusion detection: techniques, systems and challenges Comput. Secur. 28 18-28
- [6] Stahl F(2007)A survey on MANET intrusion detection Int. J. Comput. Sci. Secur. 2 417-432
- [7] Bramer M(undefined)undefined undefined undefined undefined-undefined
- [8] Parpinelli RS(undefined)undefined undefined undefined undefined-undefined
- [9] Lopes HS(undefined)undefined undefined undefined undefined-undefined
- [10] Freitas AA(undefined)undefined undefined undefined undefined-undefined