Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 344-348.
• Information Security • Previous Articles Next Articles
XING Rui-kang, LI Cheng-hai
CLC Number:
[1]ATANASSOV K.Intuitionistic fuzzy sets [J].Fuzzy Sets and Systems,1986,20(1):87-96. [2]ANDERSON J P.Computer security threat monitoring and surveillance[R].PA 19034,USA,1980,4. [3]DENNING D E.An intrusion detection model[J].IEEE Transactions on Software Engineering,1987,13(2):222. [4]SMAHA S E.Haystack:an intrusion detectionsystem[C]∥Ae-rospace Computer Security Applications Conference.Piscataway:IEEE Conference Publications,1988:37. [5]LUNTTF,JAGANNATHANR,LEER,et al.Knowledge-based intrusion detection[C]∥AI Systems in Government Conference.Piscataway:IEEE Conference Publications,1989:102-103. [6]HEBERLEIN L T,DIAS G V,LEVITT K N,et al.Anetwork security monitor [C]∥IEEE Computer Society Symposium on Research in Security and Privacy.1990:296-207. [7]CHEN S S,CHEUNG S,CRAWFORD R H,et al.GrIDS-A Graph Based Intrusion Detection System for Large Networks[C]∥Proceedings of the 19th National Information System Security Conference.1996:56-57. [8]GUN,BUEHRER.Vague sets are intuitionistic fuzzy sets[J].Fuzzy Sets and Systems,1996,79(3):403-405. [9]BURILLO P,BUSTINCE H.Intuitionistic fuzzy relations (Part I) [J].Mathware Soft Computing,1995,2:5-38. [10]BUSTINCE H,BURILLO P.Vague sets are intuitionistic fuzzy sets[J].Fuzzy Sets and Systems,1996,79(3):403-405. [11]BUSTINCE H,BURILLO P.Correlation of interval-valued intuitionistic fuzzy sets[J].Fuzzy Sets and Systems,1995,74(2):237-244. [12]EULALIA S,JANUSZ K.A concept of similarity for intuitionistic fuzzy sets and its use in group decision making [C]∥IEEE International Conference on Fuzzy Systems.2004:1129-1134. [13]EULALIA S,JANUSZ K.Entropy for intuitionistic fuzzy sets [J].Fuzzy Sets and Systems,2001,118(3):467-477. [14]林琳.直觉模糊集在近似推理与决策中的应用[D].大连:大连理工大学,2006. [15]雷英杰,王宝树,苗启广.直觉模糊关系及其合成运算[J].系统工程理论与实践,2005,25(2):113-118,133. [16]XU Z S,CHEN J,WU J J.Clustering algorithm for intuitionistic fuzzy sets [J].Information Sciences,2008(178):3775-3790. [17]ZHAO F X,MA Z M,YAN L.Fuzzy Clustering Based on Vague Relations[C]∥FSKD 2006.2006:79-88. [18]雷英杰,王宝树.直觉模糊集时态逻辑算子及扩展运算性质[J].计算机科学,2005,11(32):52-55. [19]CHEN Y H,MA X L,WU X Y.DDoS Detection Algorithm Based onPreprocessing Network Traffic Predicted Method and Chaos Theory[J].IEEE Communications letters,2013,17(5):1052-1054. [20]TAN Z Y,JAMDAGNI A,He X J,et al.A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(2):447-456. [21]FEINSTEIN L,SCHNACKENBERG D,BALUPARI R,et al.Statistical Approaches to DDoS Attack Detection and Response [C]∥Proceedings of the DARPA Information Servivability Conference and Exposition (DISCEX’03).Washington DC:IEEE Computer Society,2003:303-314. [22]THANASIS V,ALEXANDROS P,CHRISTOS I,et al.Real-time Network Data Analysis Using Time Series Models[J].Simulation Modelling Practice and Theory,2012,29(C):173-180. [23]张弛,雷英杰,黄孝文.基于直觉模糊推理的入侵检测方法[J].微电子学与计算机,2009,11(26):185-188. [24]黄孝文,张弛.基于自适应自觉模糊推理的入侵检测方法[J].计算机应用,2010,5(30):1198-1207. [25]王亚男,叶蓓,雷英杰.基于GA与IFCM聚类算法的入侵检测[J].计算机工程,2013,9(39):170-173. [26]张国锁,周创明,雷英杰.改进FCM聚类算法及其在入侵检测中的应用[J].计算机应用,2009,29(5):1336-1338. [27]贺正洪,雷英杰.直觉模糊c-均值聚类算法研究[J].控制与决策,2011,26(6):847-850,856. [28]贺正洪,雷英杰,王刚.基于直觉模糊聚类的目标识别[J].系统工程与电子技术,2011,33(6):1283-1286. [29]张弛.基于直觉模糊推理的入侵检测方法研究[D].西安:空军工程大学,2008. |
[1] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[2] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
[3] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[4] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[5] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[6] | QIAO Ying-jing, GAO Bao-lu, SHI Rui-xue, LIU Xuan, WANG Zhao-hui. Improved FCM Brain MRI Image Segmentation Algorithm Based on Tamura Texture Feature [J]. Computer Science, 2021, 48(8): 111-117. |
[7] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[8] | CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76. |
[9] | DAI Zong-ming, HU Kai, XIE Jie, GUO Ya. Ensemble Learning Algorithm Based on Intuitionistic Fuzzy Sets [J]. Computer Science, 2021, 48(6A): 270-274. |
[10] | YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523. |
[11] | CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463. |
[12] | JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331. |
[13] | WANG Ying-ying, CHANG Jun, WU Hao, ZHOU Xiang, PENG Yu. Intrusion Detection Method Based on WiFi-CSI [J]. Computer Science, 2021, 48(6): 343-348. |
[14] | LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332. |
[15] | KANG Bo, PAN Xiao-dong, WANG Hu. Fuzzy Reasoning Method Based on Axiomatic Fuzzy Sets [J]. Computer Science, 2021, 48(11A): 57-62. |
|