Computer Science ›› 2016, Vol. 43 ›› Issue (9): 57-60.doi: 10.11896/j.issn.1002-137X.2016.09.010
Previous Articles Next Articles
MA Zheng-ran, ZHANG Bo-feng and WANG Yong-jun
[1] Garcia-Teodoro P,Diaz-Verdejo J,Macia-Fernandez G,et al.Anomaly-based network intrusion detection:Techniques,systems and challenges[J].Computers & Security,2009,28(1/2):18-28 [2] Blei D M,Ng A Y,Jordan M I.Latent dirichlet allocation[J].J.Mach.Learn.Res.,2003,3:993-1022 [3] Blei D M.Probabilistic topic models[J].Commun.ACM,2012,55(4):77-84 [4] Fei-Fei L,Perona P.A bayesian hierarchical model for learning natural scene categories[C]∥IEEE Computer Society Confe-rence on Computer Vision and Pattern Recognition,2005(CVPR 2005).IEEE,2005,2:524-531 [5] Cramer,Christopher,Carin L.Bayesian topic models for describing computer network behaviors[C]∥2011 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP).IEEE,2011:1888-1891 [6] Newton B D.Anomaly Detection in Network Traffic Traces Using Latent Dirichlet Allocation.http://www.cs.unc.edu/~bn/BenNetwonFinalProjectReport.pdf [7] Huang J,Kalbarczyk Z,Nicol D M.Knowledge Discovery from Big Data for Intrusion Detection Using LDA[C]∥2014 IEEE International Congress on Big Data (BigData Congress).IEEE,2014:760-761 [8] Kasliwal B,Bhatia S,Saini S,et al.A hybrid anomaly detection model using G-LDA[C]∥2014 IEEE International Advance Computing Conference (IACC).IEEE,2014:288-293 [9] http://kdd.ics.uci.edu/databases/kddcup 99/kddcup99.html |
No related articles found! |
|