Computer Science ›› 2018, Vol. 45 ›› Issue (2): 231-235.doi: 10.11896/j.issn.1002-137X.2018.02.040
Previous Articles Next Articles
MA Zhan-fei, CHEN Hu-nian, YANG Jin, LI Xue-bao and BIAN Qi
[1] LUO B,XIA J.A novel intrusion detection system based on feature generation with visualization strategy[J].Expert Systems with Applications,2014,41(9):4139-4147. [2] SINGH R,KUMAR H,SINGLA R K.An intrusion detection system using network traffic profiling and online sequential extreme learning machine[J].Expert Systems with Applications,2015,42(22):8609-8624. [3] HUANG X,WAN R.The Construction Research of SecurityComputer Network System Based on the Distributed Intrusion Detection Technology[J].International Journal of Security and Its Applications,2014,8(6):185-196. [4] WANG Y,GU D,LI W,et al.Network intrusion detection with workflow feature definition using bp neural network[C]∥Proceedings of the IEEE International Symposium on Neural Networks.Springer Berlin Heidelberg,2009:60-67. [5] ZHANG X H,LIN B G.Research on Internet Security Based on Balanced Binary Decision Tree SVM Algorithm[J].Information Network Security,2015,6(8):20-25.(in Chinese) 张晓惠,林柏钢.基于平衡二叉决策树SVM算法的物联网安全研究[J].信息网络安全,2015,36(8):20-25. [6] WANG J,ZHU W,ZHANG W,et al.A trend fixed on firstly and seasonal adjustment model combined with the ε-SVR for short-term forecasting of electricity demand[J].Energy Policy,2009,37(11):4901-4909. [7] AN W,LIANG M.A new intrusion detection method based on SVM with minimum within-class scatter[J].Security and Communication Networks,2013,6(9):1064-1074. [8] LI Z G,GAN Q.Research on Network Intrusion Detection Mo-del for Optimizing SVM Parameters by Improved Ant Colony Algorithm[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2014,26(6):785-789.(in Chinese)李振刚,甘泉.改进蚁群算法优化SVM参数的网络入侵检测模型研究[J].重庆邮电大学学报(自然科学版),2014,26(6):785-789. [9] WU J Y,CHEN Z D.Research on Application of SVM Based on Improved PSO in Database Intrusion Detection[J].Software Guide,2015,14(4):134-136.(in Chinese) 吴纪芸,陈志德.基于改进 PSO的SVM算法在数据库入侵检测中的应用研究[J].软件导刊,2015,14(4):134-136. [10] ZHOU G,SHRESTHA A.Efficient intrusion detection scheme based on SVM[J].Journal of Networks,2013,8(9):2128-2134. [11] ZHU X M,ZHANG H B.Stability Analysis and Algorithm Improvement of PSO Algorithm[J].Computer Science,2013,40(3):275-278.(in Chinese) 朱小明,张慧斌.PSO 算法的稳定性分析及算法改进[J].计算机科学,2013,40(3):275-278. [12] LING S H,LU H H C,LEUNG F H F,et al.Improved hybrid particle swarm optimized wavelet neural network for modeling the development of fluid dispensing for electronic packaging[J].IEEE Transactions on Industrial Electronics,2008,55(9):3447-3460. [13] FARIA P,SOARES J,VALE Z,et al.Modified particle swarm optimization applied to integrated demand response and DG resources scheduling[J].IEEE Transactions on Smart Grid,2013,4(1):606-616. [14] ESMIN A A A,COELHO R A,MATWIN S.A review on particle swarm optimization algorithm and its variants to clustering high-dimensional data[J].Artificial Intelligence Review,2015,44(1):23-45. [15] SHAO P,WU Z J.A Particle Swarm Optimization Algorithm with Sine Function Factor[J].Small Microcomputer System,2015,36(1):156-161.(in Chinese) 邵鹏,吴志健.一种带正弦函数因子的粒子群优化算法[J].小型微型计算机系统,2015,36(1):156-161. [16] CHO J,LEE C,CHO S,et al.A statistical model for network data analysis:KDD CUP 99’data evaluation and its comparing with MIT Lincoln Laboratory network data[J].Simulation Modelling Practice and Theory,2010,18(4):431-435. |
No related articles found! |
|