[1] |
ANDERSON J P. Computer Security Threat Monitoring and Surveillance[EB/OL].,2017-7-10.
|
[2] |
PAPADOPOULOS G A, ARBAB F.Coordination Models and Languages[J]. Lecture Notes in Computer Science, 1998, 26(1):329-400.
|
[3] |
BUTUN I, MORGERA S D, SANKAR R.A Survey of Intrusion Detection Systems in Wireless Sensor Networks[J].IEEE Communications Surveys & Tutorials, 2014,16(1):266-282.
|
[4] |
李艺颖,邓皓文,王思齐,等. 基于机器学习和NetFPGA的智能高速入侵防御系统[J].信息网络安全,2014(2):12-19.
|
[5] |
VIEIRA K, SCHULTER A, WESTPHALL C, et al. Intrusion Detection Techniques in Grid and Cloud Computing Environment[EB/OL].,2017-7-10.
|
[6] |
VIDHYA M.Efficient Classification of Portscan Attacks Using Support Vector Machine[C]//IEEE.2013 IEEE International Conference on Green High Performance Computing, March 14-15,2013. Nagercoil, India.NJ:IEEE,2013:1-5.
|
[7] |
高妮,高岭,贺毅岳.面向入侵检测系统的DeepBeliefNets模型[J].系统工程与电子技术, 2016(9):2201-2207.
|
[8] |
梁辰,李成海,周来恩.PCA-BP神经网络入侵检测方法[J].空军工程大学学报(自然科学版), 2016,17(6):93-98.
|
[9] |
魏明军,王月月,金建国.一种改进免疫算法的入侵检测设计[J].西安电子科技大学学报, 2016(2):126-131.
|
[10] |
陈兴亮,李永忠,于化龙.基于IPMeans-KELM的入侵检测算法研究[J]. 计算机工程与应用, 2016,52(22):118-122.
|
[11] |
赵婧,魏彬,罗鹏,等.基于隐马尔可夫模型的入侵检测方法[J].四川大学学报(工程科学版), 2016(1):106-110.
|
[12] |
KUANG Fangjun, XU Weihong, ZHANG Siyang.A Novel Hybrid KPCA and SVM with GA Model for Intrusion Detection[J].Applied Soft Computing,2014,18(C):178-184.
|
[13] |
ASLAHI-SHAHRI B M, Rahmani R, CHIZARI M, et al. A Hybrid Method Consisting of GA and SVM for Intrusion Detection System[J].Neural Computing and Applications, 2016,27(6):1669-1676.
|
[14] |
戚犇,王梦迪. 基于信息增益的贝叶斯态势要素提取[J]. 信息网络安全,2017(9):54-57.
|
[15] |
KDD Cup 99 Data[EB/OL].,2017-7-10.
|
[16] |
UNB.NSL-KDD dataset[EB/OL]. ,2017-7-10.
|
[17] |
scikit-learn[EB/OL]. ,2017-7-10.
|
[18] |
汤健,孙春来,毛克峰,等. 基于主元分析和互信息维数约简策略的网络入侵异常检测[J].信息网络安全,2015(9):78-83.
|