Computer Science ›› 2014, Vol. 41 ›› Issue (4): 111-115.
Previous Articles Next Articles
WANG Hui,CHEN Hong-yu and LIU Shu-fen
[1] 2013 Internet Security Threat Report (Symantec.com.ht-tp://www.symantec.com/security_response/publications/threatreport.jsp [2] Govindarajan M,Chandrasekaran R M.Intrusion detection usingneural based hybrid classification methods [J].Computer Net-works,2011,55(8):1662-1671 [3] García-Teodoro P,Díaz-Verdejo J,Maciá-Fernández G.Anomaly-based network intrusion detection:Techniques,systems and challenges [J].Computers & Security,2009,8(1/2):18-28 [4] Mohammad M N,Sulaiman N,Muhsin O A.A novel intrusion detection system by using intelligent data mining in weka environment [J].Procedia Computer Science,2011,3(1):1237-1242 [5] Guinde N B,Ziavras S G.Efficient hardware support for pattern matching in network intrusion detection [J].Computers &Security,2010,29(7):756-769 [6] Bhuyan M H,Bhattacharyya D K,Kalita J K.Survey on Incremental Approaches for Network Anomaly Detection [J].International Journal of Communication Networks and Information Security,2011,3(3):226-239 [7] Panda M,Abraham A,Patra M R.A Hybrid Intelligent Approach for Network Intrusion Detection [J].Procedia Engineering,2012,0(1):1-9 [8] 杨杰,陈昕,万剑雄.网络协议分析与决策树挖掘的入侵检测模型研究[J].计算机应用与软件,2010,7(2):19-55 [9] 徐永华,李广水.基于距离加权模板约简和属性信息熵的增量SVM入侵检测算法[J].计算机科学,2012,9(12):76-86 [10] Li Lu,Zhang Guo-yin,Nie Jin-yuan.The Application of Genetic Algorithm to Intrusion Detection in MP2P Network [J].Lecture Notes in Computer Science,2012,31(3):390-397 [11] Wang Gang,Hao Jin-xing,Ma Jian.A new approach to intrusio-n detection using Artificial Neural Networks and fuzzy clustering [J].Expert Systems with Applications,2010,37(9):6225-6232 [12] 邓维斌,王国胤,洪智勇.基于粗糙集的加权朴素贝叶斯邮件过滤方法[J].计算机科学,2011,8(2):218-221 [13] Panda M,Patra M R.Network Intrusion Det-ection Using Naive Bayes [J].International Journal of Computer Science and Network Security,2007,7(12):258-263 [14] Farid D M,Harbi N,Rahman M Z.Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection [J].International Journal of Network Security & Its Applications,2010,2(2):12-25 [15] 江凯,高阳.并行化的半监督朴素贝叶斯分类算法[J].计算机科学与探索,2012,6(10):912-918 [16] 欧阳泽华,郭华平,范明.在逐渐缩小的空间上渐进学习朴素贝叶斯参数[J].计算机应用,2012,2(1):223-227 [17] 周晓庆,肖顺文,肖建琼,等.一种基于改进的权值调整技术数据源分类算法研究[J].计算机应用研究,2012,9(3):916-918 |
No related articles found! |
|