共 39 条
- [1] Alfonso Valdes, 1995, TECHNICAL REPORT
- [2] Alharby A, 2005, LECT NOTES COMPUT SC, V3531, P192
- [3] Aly M., 2005, Survey on Multiclass Classification Methods Extensible algorithms, V19, P2
- [4] [Anonymous], 2012, Internet security threat report, V17
- [5] Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
- [6] Bolzoni D, 2007, USENIX ASSOCIATION PROCEEDING OF THE 21ST LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, P141
- [7] Chiu CY, 2010, LECT NOTES ARTIF INT, V6171, P595, DOI 10.1007/978-3-642-14400-4_46
- [8] Geramiraz Farzaneh, 2012, International Journal of Network Security, V14, P352
- [9] Detecting anomalous and unknown intrusions against programs [J]. 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 259 - 267
- [10] Goel Radhika, 2012, INT J NETWORK SECURI, V14, P211