[1] |
A summary of China’s internet network security situation in 2018 [EB/OL].[2019-04-16].https://www.cert.org.cn/publish/main/upload/File/2018situation.pdf.(in Chinese)
|
[2] |
Gao Lu-lu,Li Fei,Xu Xiang,et al.Intrusion detection system using soeks and deep learning for in-vehicle security[J].Cluster Computing,2019,22(S6):14721-14729.
|
[3] |
Zhu Kun,Zhang Qi.Application of machine learning in network intrusion detection[J].Journal of Data Acquisition and Processing,2017,32(3):479-488.(in Chinese)
|
[4] |
Wang Chun-dong,Chen Ying-hui,Chang Qing,et al.Bayesian network intrusion detection method based on feature similarity[J].Computer Engineering,2011,37(21):102-104.(in Chinese)
|
[5] |
Bivens A,Palagiri C,Smith R,et al.Network-based intrusion detection using neural networks[J].Intelligent Engineering Systems Through Artificial Neural Networks,2002,12(1):579-584.
|
[6] |
Wang Lin-lin,Liu Jing-hao,Fu Xiao-mei.An intrusion detection method based on extreme learning machine and modified K-means[J].Computer Engineering & Science,2018,40(8):1398-1404.(in Chinese)
|
[7] |
Al-Yaseen W L,Othman Z A,Nazri M Z A.Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system[J].Expert Systems with Applications,2017,67:296-303.
|
[8] |
Khor K C,Ting C Y,Phon-Amnuaisuk S.A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection[J].Applied Intelligence,2012,36(2):320-329.
|
[9] |
Ma Chao. Parallel network intrusion detection method based on ReliefF and improved crow search optimization [J].Application Research of Computers,
|
20 |
19,36(10):3063-3068.(in Chinese)
|
[10] |
Wang Hui,Chen Hong-yu,Yang Shan-shan.An novel intrusion detection system based on naive bayesian algorithm[J].
|
|
Journal of Applied Sciences,2013,13(10):1865-1870.
|
[11] |
Fung C J,Zhang Jie,Boutaba R.Effective acquaintance ma -nagement based on bayesian learning for distributed intrusion detection networks[J].IEEE Transactions on Network and Service Management,2012,9(3):320-332.
|
[12] |
Kemal A,Serhat K,Onur C.Classification and diagnosis of cervical cancer with softmax classification with stacked autoencoder[J].Expert Systems with Applications,2019,115(1):557-564.
|
[13] |
Moustafa N,Slay J.The evaluation of network anomaly detection systems:Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set[J].Information Security Journal A Global Perspective,2016,25(1-3):18-31.
|
[14] |
Moustafa N,Slay J.UNSW-NB15:A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)[C]∥Proc of 2015 Military Communications and Information Systems Conference (MilCIS),2015:1-6.
|
|
附中文参考文献:
|
[1] |
2018年我国互联网网络安全态势综述[EB/OL].[2019-04-16].
|
|
https://www.cert.org.cn/publish/main/upload/File/2018situation.pdf.
|
[3] |
朱琨,张琪.机器学习在网络入侵检测中的应用[J].数据采集与处理,2017,32(3):479-488.
|
[4] |
王春东,陈英辉,常青,等.基于特征相似度的贝叶斯网络入侵检测方法[J].计算机工程,2011,37(21):102-104.
|
[6] |
王琳琳,刘敬浩,付晓梅.基于极限学习机与改进K-means算法的入侵检测方法[J].计算机工程与科学,2018,40(8):1398-1404.
|
[9] |
马超.基于ReliefF和改进乌鸦搜索优化的并行入侵检测方法[J].计算机应用研究,2019,36(10):3063-3068.
|