共 14 条
[1]
Agrawal R., 1994, P 20 INT C VER LARG, V1215, P487
[2]
Bishop C. M., 2006, PATTERN RECOGNITION
[4]
Holland J. H., 1992, ADAPTATION NATURAL A
[5]
Katagiri H, 2001, P GECCO INT C, P219
[6]
KOZA JR, 1994, STAT COMPUT, V4, P87, DOI 10.1007/BF00175355
[7]
Lee W., 1998, P 1998 USENIX SEC S
[8]
An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2011, 41 (01)
:130-139
[9]
Quinlan R., 1993, C4 5 PROGRAMS MACHIN
[10]
Shimada K., 2006, Transactions of the Institute of Electrical Engineers of Japan, Part C, V126-C, P849, DOI 10.1541/ieejeiss.126.849