共 24 条
[1]
ANDERSON D, 1995, SRICSL9507
[2]
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[3]
[Anonymous], 2002, Adaptive Blind Signal and Image Processing: Learning Algorithms and Applications
[4]
[Anonymous], 3 C SEC NETW ARCH LA
[5]
[Anonymous], 2001, NEURAL NETWORKS COMP
[7]
Diamantaras KI, 1996, Principal Component Neural Networks: Theory and Applications
[8]
Ghosh AK, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), P141
[9]
Kohonen T, 2001, SELF ORG MAPS, DOI [10.1007/978-3-642-56927-2_1, DOI 10.1007/978-3-642-56927-2_1]
[10]
Dimension reduction using feature extraction methods for real-time misuse detection systems
[J].
PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP,
2004,
:195-202