共 50 条
- [41] Singh U., Gupta S., Incorporation of IDS in real world applications, Journal of Emerging Trends in Computing and Information Sciences, 3, 1, pp. 15-20, (2012)
- [42] Stolfo J., Wei F., Lee W., Prodromidis A., Chan P.K., Mining with application to fraud and intrusion detection: Results from the JAM project, Proceedings of DARPA Information Survivability Conference and Exposition, pp. 130-144, (2000)
- [43] Tavallaee M., Bagheri E., Lu W., Ghorbani A.A., A detailed analysis of the KDD CUP 99 data set, Proceedings of 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009, pp. 53-58, (2009)
- [44] Verdenius F., Van Someren M.W., Journal of AI Communications 1997). Applications of inductive learning techniques: A survey in the Netherlands. [IOS Press.], 10, 1, pp. 3-20
- [45] Viinikka J., Debar H., Monitoring IDS background noise using EWMA control charts and alert information. [Springer-Verlag.], Recent Advances in Intrusion Detection, LNCS, 3224, pp. 166-187, (2004)
- [46] Wang K., Stolfo S.J., Anomalous payload-based network intrusion detection. RAID 2004 [Springer-Verlag.], LNCS, 3224, pp. 203-222, (2004)
- [47] Yuan Y., Guanzhong D., An intrusion detection expert system with fact-base, Asian Journal of Information Technology, 6, 5, pp. 614-617, (2007)
- [48] Zanero S., Behavioural intrusion detection, Proceedings of the 19th ISCIS Symposium, Antalya, Turkey, pp. 657-666, (2004)
- [49] Zanero S., Savaresi S.M., Unsupervised learning techniques for an intrusion detection system, Proceedings of the ACM Symposium on Applied Computing, ACM SAC, pp. 412-419, (2004)
- [50] Zubair A.B., Multi-Agent systems for protecting critical infrastructures: A survey, Journal of Network and Computer Applications, 35, 3, pp. 1151-1161, (2012)