共 30 条
[2]
[Anonymous], 1995, SRICSL9507
[3]
Anuar NB, 2008, MALAYS J COMPUT SCI, V21, P101
[4]
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[5]
Beauquier J., 2007, CESSE07
[6]
Bhat A. H., 2013, INT J APPL INNOV ENG, V2, P56
[7]
de la Hoz E, 2013, LECT NOTES COMPUT SC, V8073, P103, DOI 10.1007/978-3-642-40846-5_11
[8]
Intrusion detection with data correlation relation graph
[J].
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY,
2008,
:982-989
[9]
AdaBoost-based algorithm for network intrusion detection
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS,
2008, 38 (02)
:577-583
[10]
Jamdagni A., 2010, P 6 INT WIR COMM MOB, P1193, DOI DOI 10.1145/1815396.1815669