[1] |
黄海,谢冬青,宋一赞. WiFi-WiMAX异构无线网络认证机制研究[J]. 信息网络安全,2015(6):19-25.
|
[2] |
BORAH S, CHETRY S P K, SINGH P K. Hashed-K-Means: A Proposed Intrusion Detection Algorithm[A].Computational Intelligence and Information Technology[M]. Heidelberg Berlin: Springer, 2011:855-860.
|
[3] |
MA Zhenghui, KABAN A.K-Nearest-Neighbours with a Novel Similarity Measure for Intrusion Detection[C]// UKCI .Computational Intelligence 2013 13th UK Workshop on,September 9-11,2013,Guildford ,UK.Piscataway, NJ, USA: IEEE, 2013:266-271.
|
[4] |
YI Yang, WU Jiansheng, XU Wei.Incremental SVM Based on Reserved Set for Network Intrusion Detection[J]. Expert Systems with Applications, 2011, 38(6):7698-7707.
|
[5] |
TAN Zhiyuan, JAMDAGNI A, HE X, et al.Network Intrusion Detection Based on LDA for Payload Feature Selection[C]// IEEE. GLOBECOM Workshops (GC Wkshps), December 6-10,2010. Piscataway, NJ, USA: IEEE, 2011:1545-1549.
|
[6] |
SINGH S, SILAKARI S.An Ensemble Approach for Feature Selection of Cyber Attack Dataset[J]. International Journal of Computer Science and Information Security ,2009,6(2):297-302.
|
[7] |
MAHALANOBIS P C. On the Generalized Distance in Statistics[J]. Proceedings of the National Institute of Sciences, 1936(2):49-55.
|
[8] |
CHOU T S, YEN K K, LUO J. Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms[J]. International Journal of Computational Intelligence, 2008(3):196.
|
[9] |
CHONG E L, MUN Y N,CHRISTOPHER L, et al.Intrusion Detection for Routing Attacks in Sensor Networks[J]. International Journal of Distributed Sensor Networks, 2006, 2(4):313-332.
|
[10] |
戚名钰,刘铭,傅彦铭. 基于PCA的SVM网络入侵检测研究[J]. 信息网络安全,2015(2):15-18.
|