共 15 条
[1]
[Anonymous], 2003, P 10 ACM C COMP COMM, DOI DOI 10.1145/948109.948137
[2]
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[3]
FAOUR A, 2006, P 1 JOINT C SEC NETW, P277
[4]
Julisch Klaus., 2002, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, P366, DOI [10.1145/775047.775101, DOI 10.1145/775047.775101]
[6]
Kayacik HG, 2003, IEEE IJCNN, P1808
[7]
Kohonen T., 1995, Self-Organizing Maps, V30
[8]
KRUEGEL C, 2004, PRACT INF PROCESS CO, V27, P220
[9]
Host-based intrusion detection using self-organizing maps
[J].
PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3,
2002,
:1714-1719
[10]
*MATLAB SOFTW, LANG TECHN COMP VERS