Computer Science ›› 2014, Vol. 41 ›› Issue (2): 197-200.
Previous Articles Next Articles
TAN Ai-ping,CHEN Hao and WU Bo-qiao
[1] Amor N,Benferhat S,Elouedi Z.Naive Bayes VS Decision Trees in Intrusion Detection System[C]∥Proceedings of the 2004ACM Symposium on Applied Computing.2004:420-424 [2] Sebring M,Shellhouse M,Hanna E.Expert systems in intrusion detection:a case study[C]∥Proceedings of the 11th National Computer Security Conference.Baltimore,Maryland,2006:74-81 [3] Fuchsberger A.Intrusion Detection Systems and Intrusion Prevention Systems[J].Information Security Technical Report,2005,34(10):134-139 [4] Hu Y,Perrig A,Johnson D.Wormhole attacks in wireless net-works[J].IEEE Journal on Selected Areas in Communications,2006,24(2):370-380 [5] 王振树,李林川,牛丽.基于贝叶斯证据框架的SVM负荷建模[J].电工技术学报,2009,24(8):83-86 [6] Davy M,Desobry F,Arthur G.An online support vector ma-chine for abnormal events detection[J].Signal Processing,2006,86(8):2009-2025 [7] Bo Cui-mei.Research on the modeling method based on eliding time window for support vector machine soft-sensing [J].Automatic Instrument,2006,27(1):45-51 [8] 李良敏,温广瑞,王生昌.基于遗传算法的回归型SVM参数选择法[J].计算机工程与应用,2008,44(7):23-26 [9] 颜根廷,李传江,马广富.基于混合遗传算法的SVM参数选择[J].哈尔滨工业大学学报,2008,40(5):134-138 [10] 陈爱斌,夏利民,赵桂敏.基于Boosting方法的人脸检测[J].计算机工程与应用,2004,27(3):48-52 [11] 吴飞,庄永真,潘红.基于分形布朗运动和AdaBoosting的多类音频例子识别[J].计算机研究与发展,2003,18(7):62-65 [12] Diao Li-li,Hu Ke-yun,Lu Yu-chang.Improved Stumps Combined by boosting for Text Categorization[J].Journal of Software,2002,25(8):51-53 [13] 夏利民,戴汝为.基于Boosting模糊分类的滚动轴承故障诊断[J].模式识别与人工智能,2003,18(3):72-75 |
No related articles found! |
|