共 50 条
- [31] Analysis of Intrusion Detection System [J]. COMPONENTS, PACKAGING AND MANUFACTURING TECHNOLOGY, 2011, 460-461 : 451 - 454
- [32] Data mining for intrusion detection [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E7 - E12
- [34] Adaptive IDS Alerts Correlation according to the traffic type and the attacks properties [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1652 - 1657
- [36] Novel method to calculate causal correlation belief values of network alerts [J]. Jiefangjun Ligong Daxue Xuebao, 2009, 3 (215-218):
- [37] Wireless intrusion detection and response [J]. IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 68 - 75
- [38] Correlating intrusion alerts to obtain attack instances through improved evolving self-organizing maps [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 580 - 586