Computer Science ›› 2014, Vol. 41 ›› Issue (12): 43-47.doi: 10.11896/j.issn.1002-137X.2014.12.010
Previous Articles Next Articles
FENG Xiang,MA Mei-yi,ZHAO Tian-ling and YU Hui-qun
[1] anonymity.NET NEWS:Policing the Computer Underworld[J].Science,1998,282(11):1223-1224 [2] El-Khatib K.Impact of feature reduction on the efficiency ofwireless intrusion detection systems[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(8):1143-1149 [3] Wang Y,Fu W,Agrawal D.Gaussian Versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2013(2):342-355 [4] 方贤进,李龙澍,钱海.基于人工免疫的网络入侵检测中疫苗算子的作用研究 [J].计算机科学,2010,37(1):239-242 [5] 黄建忠,裴灿浩,谢长生,等.一种基于人工免疫技术的存储异常检测系统[J].计算机科学,2010,37(1):42-46 [6] Zhang Y,Wang L,Sun W,et al.Distributed intrusion detection system in a multi-layer network architecture of smart grids[J].IEEE Transactions on Smart Grid,2011,2(4):796-808 [7] Ou C M.Host-based intrusion detection systems adapted from agent-based artificial immune systems[J].Neurocomputing,2012(7):78-86 [8] Wu S X,Banzhaf W.The use of computational intelligence in intrusion detection systems:A review[J].Applied Soft Computing,2010,10(1):1-35 (下转第77页)(上接第47页) [9] Timmins J,Hone A,Stibor T,et al.Theoretical advances in artificial immune systems[J].Theoretical Computer Science,2008,3:11-32 [10] Yang J,Liu X J,Li T,et al.Distrubited agents model for intrusion detection based on AIS [J].Knowledge-Based Systems,2009,22:115-119 [11] Sobh T S,Mostafa W M.A cooperative immunological approach for detecting network anomaly [J].Applied Soft Computing,2011,11:1275-1283 [12] Powers S T,He J.A hybrid artificial immune system and self organising map for network intrusion detection [J].Information Sciences,2008,178:3024-3042 [13] Meisel M,Pappas V,Zhang L.A taxonomy of biologically inspired research in computer networking [J].Computer Networks,2010,54:901-916 [14] Visconti A,Tahayori H.Artificial immune system based on interval type-2 fuzzy set paradigm [J].Applied Soft Computing,2011,11:4055-4063 [15] Tsai C F,Hsu Y F,Lin C Y,et al.Intrusion detection by machine learning:a review [J].Expert Systems with Applications,2009(36):11994-12000 |
No related articles found! |
|