[1] |
LUO Z Y , YOU B , XU J Z , et al. Attack graph algorithm in the application of intrusion detection system[J]. International Journal of Security and its Applications, 2013,(9): 249-256.
|
[2] |
LUO Z Y , YOU B , YU G H , et al. Research of intrusive intention self-recognition algorithm based on three-tier attack graph[J]. ICIC Express Letters,Part B:Applications, 2015,(1): 1575-1580.
|
[3] |
阳时来, 杨雅辉, 沈晴霓 , 等. 一种基于半监督GHSOM的入侵检测方法[J]. 计算机研究与发展, 2013,50(11): 2375-2382. YANG S L , YANG Y H , SHEN Q N , et al. A method of intrusion detection based on semi-supervised GHSOM[J]. Journal of Computer Research and Development, 2013,50(11): 2375-2382.
|
[4] |
杨雅辉, 姜电波, 沈晴霓 , 等. 基于改进的GHSOM的入侵检测研究[J]. 通信学报, 2011,32(1): 121-126. YANG Y H , JIANG D B , SHEN Q N , et al. Research on intrusion detection based on an improved GHSOM[J]. Journal on Communications, 2011,32(1): 121-126.
|
[5] |
ZELL A , BAYER H , BAUKNECHT H . Similarity analysis of molecules with self-organizing surfaces—an extension of the self- organizing map[A]. Proceedings of the International Conference on Neural Networks[C]. 1994. 719-724.
|
[6] |
DENG D , KASABOV N . ESOM:an algorithm to evolve selforganizing maps from on-line data streams[A]. Proceedings of the International Joint Conference on Neural Networks[C]. 2000.38.
|
[7] |
杨雅辉, 黄海珍, 沈晴霓 , 等. 基于增量式 GHSOM 神经网络模型的入侵检测研究[J]. 计算机学报, 2014,37(5): 1216-1224. YANG Y H , HUANG H Z , SHEN Q N , et al. Research on intrusion detection based on incremental GHSOM[J]. Chinese Journal of Computers, 2014,37(5): 1216-1224.
|
[8] |
李玲玲, 马东娟, 王成山 , 等. DS 证据理论冲突处理新方法[J]. 计算机应用研究, 2011,28(12): 4528-4531. LI L L , MA D J , WANG C S , et al. New method for conflict evidence processing in DS theory[J]. Application Research of Computers, 2011,28(12): 4528-4531.
|
[9] |
邱望仁, 刘晓东 . 基于证据理论的模糊时间序列预测模型[J]. 控制与决策, 2012,27(1): 99-103. QIU W R , LIU X D . Fuzzy time series model for forecasting based on Dempster-Shafer theory[J]. Control and Decision, 2012,27(1): 99-103.
|
[10] |
杜元伟, 石方园, 杨娜 . 基于证据理论/层次分析法的贝叶斯网络建模方法[J]. 计算机应用, 2015,35(1): 140-146,151. DU Y W , SHI F Y , YANG N . Construction method for Bayesian network based on Dempster-Shafer/analytic hierarchy process[J]. Journal of Computer Applications, 2015,35(1): 140-146,151.
|