1 |
陆悠, 李伟, 罗军舟 等. 一种基于选择性协同学习的网络用户异常行为检测方法. 计算机学报, 2014,37(1):28~40 Lu Y , Li W , Luo J Z , et al. A network user's abnormal behavior detection approach based on selective collaborative learning. Chinese Journal of Computers, 2014,37(1):28~40
|
2 |
张晓惠, 林柏钢 . 基于特征选择和多分类支持向量机的异常检测. 通信学报, 2009,30(10A):68~73 Zhang X H , Lin B G . Anomaly detection based on feature selection and multi-class support vector machines. Journal on Communications, 2009,30(10A):68~73
|
3 |
李洋, 方滨兴, 郭莉 等. 基于主动学习和 TCM-KNN 方法的有指导入侵检测技术. 计算机学报, 2007,30(8):1464~1473 Li Y , Fang B X , Guo L et al. Supervised intrusion detection based on active learning and TCM-KNN algorithm. Chinese Journal of Computers, 2007,30(8):1464~1473
|
4 |
Li Y , Li W , Wu G . An intrusion detection approach using SVM and multiple kernel method. International Journal of Advancements in Computing Technology, 2012,4(1):463~469
|
5 |
Biggio B , Corona I , Nelson B et al. Security Evaluation of Support Vector Machines in Adversarial Environments. Berlin:Springer International Publishing, 2014
|
6 |
Damopoulos D , Menesidou S A , Kambourakis G et al. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Security and Communication Networks, 2012,5(1):3~14
|
7 |
Laskov P , Lippmann R . Machine learning in adversarial environments. Machine Learning, 2010,81(2):115~119
|
8 |
Singh A , Walenstein A , Lakhotia A . Tracking concept drift in malware families. Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, Raleigh,USA, 2012:81~92
|
9 |
Kantchelian A , Afroz S , Huang L et al. Approaches to adversarial drift.Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security. 2013:99~110
|
10 |
Barreno M , Nelson B , Joseph A D , et al. The security of machine learning. Machine Learning, 2010,81(2):121~148
|
11 |
Newsome J , Karp B , Song D . Paragraph:Thwarting Signature Learning by Training Maliciously. Berlin:Springer Berlin Heidelberg, 2006
|
12 |
Tsymbal A . The problem of concept drift:definitions and related work. Computer Science Department, Trinity College Dublin, 2004
|
13 |
Widmer G , Kubat M . Learning in the presence of concept drift and hidden contexts. Machine Learning, 1996,23(1):69~101
|
14 |
Zliobaite I . Learning Under Concept Drift:an Overview. Technical Report,Vilnius University, 2009
|
15 |
Kelly M G , Hand D J , Adams N M . The impact of changing populations on classifier performance. Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, 1999:367~371
|
16 |
Van Erven T , Harremo?s P . Rényi divergence and majorization.Proceedings of 2010 IEEE International Symposium on Information Theory(ISIT). Austin,Texas,USA, 2010:1335~1339
|
17 |
Yu S , Zhou W , Doss R . Information theory based detection against network behavior mimicking DDoS attacks. Communications Letters, 2008,12(4):318~321
|
18 |
Jaynes E T . Information theory and statistical mechanics. Physical Review, 1957,106(4)
|
19 |
Shannon C E . A mathematical theory of communication. The Bell System Technical Journal, 1948(27):379~423,623~656
|
20 |
Hettich S , Bay S D . KDD cup 1999. , 2007
|