[1] |
唐成华, 刘鹏程, 汤申生 ,等. 基于特征选择的模糊聚类异常入侵行为检测[J]. 计算机研究与发展, 2015,52(3): 718-728.
|
|
TANG C H , LIU P C , TANG S S ,et al. Fuzzy clustering abnormal behavior detection based on feature selection[J]. Computer Re-search and Development, 2015,52(3): 718-728.
|
[2] |
XU J H , LIU H . Web user clustering analysis based on k-means algorithm[C]// Proceeding of the 2010 International Conference on Information,Networking and Automation (ICINA),New York. 2010: 6-9.
|
[3] |
LI P , LIU L , GAO D ,et al. On challenges in evaluating malware clustering[C]. Recent Advances in Intrusion Detection,Ottawa. 2010: 238-255.
|
[4] |
武小年, 彭小金, 杨宇洋 ,等. 入侵检测中基于 SVM 的两级特征选择方法[J]. 通信学报, 2015,36(4): 19-26.
|
|
WU X N , PENG X J , YANG Y Y ,et al. Two levels of feature selec-tion methods based on SVM in intrusion detection[J]. Journal on Communication, 2015,36(4): 19-26.
|
[5] |
郑黎明, 邹鹏, 韩伟红 ,等. 基于多维熵值分类的骨干网流量异常检测研究[J]. 计算机研究与发展, 2012,49(9): 1972-1981.
|
|
ZHENG L M , ZOU P , HAN W H ,et al. Backone network traffic anomaly detection study based on multidimensional entropy classi-fication[J]. Computer Research and Development, 2012,49(9): 1972-1981.
|
[6] |
SHINGO M , CHEN C , LU N N . Intrusion-detection model based on fuzzy class-association-rule mining using genetic programming network[J]. IEEE Transaction on Systems,Man,and Cybernetics, 2011,41(1): 130-139.
|
[7] |
DASH S K , REDDY K S . Adaptive naive Bayes method for mas-querade detection[J]. Security and Communications Networks, 2011,4(4): 410-417.
|
[8] |
张玲, 白中英, 罗守山 ,等. 基于粗糙集和人工免疫的集成入侵检测模型[J]. 通信学报, 2013,34(9): 166-176.
|
|
ZHANG L , BAI Z Y , LUO S S ,et al. Ensemble intrusion detection model based on rough set and artificial immunity[J]. Journal on Communication, 2013,34(9): 166-176.
|
[9] |
陆悠, 李伟, 罗军舟 ,等. 一种基于选择性协同学习的网络用户异常行为检测方法[J]. 计算机学报, 2014,37(1): 28-40.
|
|
LU Y , LI W , LUO J Z ,et al. A method of network users abnormal behavior based on selective collaborative learning[J]. Chinese Journal of Computer, 2014,37(1): 28-40.
|
[10] |
FLAVIO C , NILESH D , RAVI K . Correlation clustering in MapRe-duce[C]// Proceeding of the 20th ACM SIGKDD International Con-ference on Knowledge Discovery and Data Mining (KDD 2014),New York. 2014: 641-650.
|
[11] |
钱叶魁, 陈鸣, 叶立新 ,等. 基于多尺度主成分分析的全网络异常检测方法[J]. 软件学报, 2012,23(2): 361-377.
|
|
QIAN Y K , CHEN M , YE L X ,et al. Methods of full network anomaly detection based on multi-scale principle component analy-sis[J]. Journal of Software, 2012,23(2): 361-377.
|
[12] |
RUBINSTEIN B , NELSON B , HUANG L ,et al. Stealthy poison-ing attacks on PCA-based anomaly detectors[C]// Proceeding of the ACM SIGMETRICS,New York. 2009.
|