[1] |
Tang Zhengjun, Li Jianhua. Intrusion detection[M].Beijing:Tsinghua University Press,2004.(in Chinese)
|
[2] |
Zhuge Jianwei, Wang Dawei, Chen Yu, et al. A network anomaly detector based on the DS evidence theory [J].Journal of Software, 2006, 17(3):463471.(in Chinese)
|
[3] |
Su Lu, Li Quanlong, Xu Xiaofei, et al. Data fusion algorithm for sensor network based on DS evidence theory [J]. MINIMICRO SYSTEMS, 2006,27(7):13211325.(in Chinese)
|
[4] |
Yang Jing, Lin Yi, Hong Lu, et al. Improved method to DS evidence theory based on weight and matrix[J]. Computer Engineering and Applications, 2012, 48(20):150153.(in Chinese)
|
[5] |
KDD Cup 1999 Data[EB /OL].[20080101].http://www. ics.uci. edu /~kdd/databases /kddcup99 /kddcup99. html.
|
[6] |
LIBSVM data sets[CP/OL]. [20120701]. http: //www.csie.ntu.edu.tw/~cjlin/libsvm/.(in Chinese)
|
[7] |
Chen You, Shen Huawei, Li Yang, et al. An efficient feature selection algorithm toward building lightweight intrusion detection system[J]. Chinese Journal of Computers, 2007,30(8):13981408.(in Chinese)
|
[8] |
Tian Junfeng, Zhao Weidong, Du Ruizhong. DS evidence theory and its data fusion application in intrusion detection[C]∥Proc of CIS’05,2005:244251.
|
[9] |
Halavati R ,Shouraki S B,Zadeh S H. Recognition of human speech phonemes using a novel fuzzy approach[J].Applied Soft Computing Journal ,2007,7(3):828839.
|
[10] |
The ROSETTA Homepage[EB/OL].[19980402]. http://www.idi.ntnu. no/~aleks/rosetta/.
|
[11] |
Yao Yu, Gao Fuxiang, Yu Ge. IDS evaluation approach based on ROC curves [J]. Journal on Communications, 2006, 26(1A):113115.(in Chinese)
|
|
附中文参考文献:
|
[1] |
唐正军,李建华.入侵检测技术[M].北京:清华大学出版社,2004.
|
[2] |
诸葛建伟,王大为,陈昱,等.基于DS证据理论的网络异常检测方法[J].软件学报2006,17(3):463471.
|
[3] |
宿陆,李全龙,徐晓飞,等.基于DS证据理论的传感器网络数据融合算法[J].小型微型计算机系统,2006,27(7):13211325.
|
[4] |
杨靖, 林益, 洪露, 等. 一种改进的DS证据理论合成方法[J].计算机工程与应用, 2012,48(20):150153.
|
[7] |
陈友,沈华伟,李洋,等.一种高效的面向轻量级入侵检测系统的特征选择算法[J].计算机学报,2007,30(8):13981408.
|
[6] |
LIBSVM data sets [CP/OL]. [20120701]. http://www.csie.ntu.edu.tw/~cjlin/libsvm/.
|
[11] |
姚羽,高福祥,于戈.基于ROC曲线的入侵检测评估方法[J].通信学报,2006,26(1A):113115.
|