共 29 条
[11]
HO SS, 2003, P IEEE JOINT C NEUR, P20
[12]
Lee W., 2000, ACM Transactions on Information and Systems Security, V3, P227, DOI 10.1145/382912.382914
[13]
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[14]
LI M, 1998, INTRO KOLMOGOROV COM
[15]
Li Y, 2007, 2007 International Symposium on Computer Science & Technology, Proceedings, P133
[16]
An efficient network anomaly detection scheme based on TCM-KNN algorithm and data reduction mechanism
[J].
2007 IEEE INFORMATION ASSURANCE WORKSHOP,
2007,
:221-+
[17]
Lippmann R, 2000, P DARPA INF SURV C E, V2, P12, DOI DOI 10.1109/DISCEX.2000.821506
[18]
Improving intrusion detection performance using keyword selection and neural networks
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
2000, 34 (04)
:597-603
[19]
Luo JX, 2000, INT J INTELL SYST, V15, P687, DOI 10.1002/1098-111X(200008)15:8<687::AID-INT1>3.0.CO
[20]
2-X