[1] |
Qing Sihan, Jiang Jianchun, Ma Hengtai, et al. Research on intrusion detection techniques:A survey[J]. Journal of China Institute of Communications, 2004, 25(7):1929. (in Chinese)
|
[2] |
Wang Qian,Chen Bing.Intrusion detection system using CVM algorithm with extensive kernel methods[J]. Journal of Computer Research and Development, 2012,49(5):974982. (in Chinese)
|
[3] |
Wang Tao.Association decision based multiple source network intrusion detection algorithm[J]. Computer Simulation, 2012, 29 (8):120122. (in Chinese)
|
[4] |
Gong Xingchao, Guan Xin. Intrusion detection model based on the improved neural network and expert system[C]∥Proc of IEEE Symposium on Electrical & Electronics Engineering, 2012:191193.
|
[5] |
Srinivas M, Andrew H. A comparative study of techniques for intrusion detection[C]∥Proc of the 23rd IEEE International Conference on Tools with Artificial Intelligence, 2009:570577.
|
[6] |
Ren Ziwu, San Ye. Improved adaptive genetic algorithm and its application research in parameter identification[J]. Journal of System Simulation, 2006,18(1):4166. (in Chinese)
|
[7] |
Huang Lijun, Xu Yonghua. Solving TSP converged on genetic algorithm and the ant algorithm[J]. Journal of Northeast Agricultural University, 2008,39(4):109113. (in Chinese)
|
[8] |
Li Shuhui, Ma Li, Xu Xuezhou. Intrusion detection techniques research based on genetic neural networks [J]. Modern Electronic Technique,2005(5):7880.(in Chinese)
|
[9] |
Yan Yan.A new adaptive genetic algorithm[D]. Harbin:Harbin Engineering University, 2007. (in Chinese)
|
[10] |
Yang Weibo,Zhao Yanwei.Improved simulated annealing algorithm for TSP [J]. Computer Engineering and Applications, 2010,46(15):3436. (in Chinese)
|
[11] |
Li Shuhui. Improved evolutionary neural network algorithm and its applications in intrusion detection[J]. Modern Electronic Technique, 2010, 33(1):7880. (in Chinese)
|
[12] |
Zhang Xinyou, Zeng Huacan, Jia Lei. Research of intrusion detection system datasetKDD CUP99[J]. Computer Engineering & Design, 2010,31(2):48094813. (in Chinese)
|
[13] |
Xu Yonghua, Li Guangshui. Incremental SVM intrusion detection algorithm based on distance weighted template reduction and attribute information entropyc [J]. Computer Science, 2012, 39(12):7678. (in Chinese)
|
|
附中文参考文献:
|
[1] |
卿斯汉, 蒋建春, 马恒太,等. 入侵检测技术研究综述[J]. 通信学报, 2004, 25(7):1929.
|
[2] |
王奇安, 陈兵. 基于广泛内核的CVM算法的入侵检测[J]. 计算机研究与发展, 2012, 49(5):974982.
|
[3] |
王涛. 基于关联决策算法的网络多源入侵检测[J]. 计算机仿真, 2012, 29(8):120122.
|
[6] |
任子武, 伞冶. 自适应遗传算法的改进及在系统辨识中应用研究[J]. 系统仿真学报, 2006,18(1):4166.
|
[7] |
黄立君, 许永花. 遗传算法和蚁群算法融合求解TSP[J]. 东北农业大学学报, 2008,39(4):109113.
|
[8] |
李淑慧, 马力, 徐学洲. 基于遗传神经网络的入侵检测方法研究[J]. 现代电子技术,2005(5):7880.
|
[9] |
闫妍. 一种新的自适应遗传算法[D]. 哈尔滨:哈尔滨工业大学, 2007.
|
[10] |
杨卫波, 赵燕伟. 求解TSP问题的改进模拟退火算法[J]. 计算机工程与应用, 2010,46(15):3436.
|
[11] |
李淑慧. 改进进化神经网络算法及其在入侵检测中的应用[J]. 现代电子技术,2010,33(1):7880.
|
[12] |
张新有, 曾华粲, 贾磊. 入侵检测数据集KDD CUP99研究[J]. 计算机工程与设计,2010,31(2):48094813.
|
[13] |
徐永华, 李广水. 基于距离加权模板约简和属性信息熵的增量SVM入侵检测算法[J]. 计算机科学, 2012,39(12):7678.
|