共 57 条
[1]
Protocol analysis in intrusion detection using decision tree
[J].
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS,
2004,
:404-408
[2]
[Anonymous], P 9 ACM SIGKDD INT C
[3]
[Anonymous], 2001, THESIS U CALIFORNIA
[4]
Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis
[J].
2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS,
2002,
:64-73
[5]
Bonifacio JM, 1998, IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE, P205, DOI 10.1109/IJCNN.1998.682263
[6]
CABARERA JBD, 2000, P MOD AN SIM COMP TE, P466
[9]
Network-based anomaly intrusion detection system using SOMs
[J].
PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE,
2004,
:76-79
[10]
Elkan Charles, 2000, ACM SIGKDD Explor. Newslett., V1, P63, DOI DOI 10.1145/846183.846199