[1] BEGHDAD R. Modelling and solving the intrusion detection problem in computer networks[J]. Computers & Security, 2004, 23(8):687-696. [2] 戴远飞,陈星,陈宏,等.基于特征选择的网络入侵检测方法[J].计算机应用研究,2017,34(8):2429-2433.(DAI Y F, CHEN X, CHEN H, et al. Computer application research based on feature selection network intrusion detection method[J].Application Research of Computers, 2017,34(8):2429-2433.) [3] KENNEDY J, EBERHART R. Particle swarm optimization[C]//Proceedings of the 1995 IEEE International Conference on Neural Networks. Piscataway, NJ:IEEE, 2002:1942-1948. [4] BATAINEH M A, AL-QUDAH Z. A novel gene identification algorithm with Bayesian classification[J]. Biomedical Signal Processing and Control, 2017, 31:6-15. [5] 陈昌帅. 二进制灰狼优化算法的研究与分析[J]. 信息系统工程, 2016(7):136-138.(CHEN C S. Research and analysis of binary gray wolf optimization algorithm[J]. Information Systems Engineering, 2016(7):136-138.) [6] OUAARAB A, AHIOD B, YANG X S. Discrete cuckoo search algorithm for the travelling salesman problem[J]. Neural Computing & Applications, 2014, 24(7/8):1659-1669. [7] MIRJALILI S. Moth-flame optimization algorithm:a novel nature-inspired heuristic paradigm[J]. Knowledge-Based Systems, 2015, 89:228-249. [8] 李志明, 莫愿斌, 张森. 一种新颖的群智能算法:飞蛾扑火优化算法[J]. 电脑知识与技术, 2016, 12(31):172-176.(LI Z M, MO Y B, ZHANG S. A novel swarm intelligence algorithm:Moth-flame optimization algorithm[J]. Computer Knowledge and Technology, 2016, 12(31):172-176.) [9] 李伟琨,阙波,王万良,等.基于多目标飞蛾算法的电力系统无功优化研究[J].计算机科学,2017,44(S2):503-509.(LI W K, QUE W, WANG W L, et al. Multi-objective moth-flame optimization algorithm based optimal reactive power dispatch for power system[J]. Computer Science,2017,44(S2):503-509.) [10] SAVSANI V, TAWHID M A. Non-dominated Sorting Moth Flame Optimization (NS-MFO) for multi-objective problems[J]. Engineering Applications of Artificial Intelligence, 2017, 63:20-32. [11] SINGH P, PRAKASH S. Optical network unit placement in Fiber-Wireless (FiWi) access network by moth-flame optimization algorithm[J]. Optical Fiber Technology, 2017, 36:403-411. [12] YILDIZ B S, YILDIZ A R. Moth-flame optimization algorithm to determine optimal machining parameters in manufacturing processes[J]. Materials Testing, 2017, 59(5):425-429. [13] 李志明, 莫愿斌. 基于Lévy飞行的飞蛾扑火优化算法[J].计算机工程与设计,2017,38(3):807-813.(LI Z M, MO Y B. Moth-flame optimization algorithm based on Lévy flights[J]. Computer Engineering and Design,2017,38(3):807-813.) [14] 吴伟民,李泽熊,林志毅,等.飞蛾纵横交叉混沌捕焰优化算法[J].计算机工程与应用,2018,54(3):136-141.(WU W M, LI Z X, LIN Z Y, et al. Multi-objective moth-flame optimization algorithm based optimal reactive power dispatch for power system[J]. Computer Engineering and Design, 2018,54(3):136-141.) [15] 计智伟, 胡珉, 尹建新. 特征选择算法综述[J]. 电子设计工程, 2011, 19(9):46-51.(JI Z W, HU M, YIN J X. A summary of feature selection algorithms[J]. Electronic Design Engineering, 2011, 19(9):46-51.) [16] UKIL A. Support vector machine[J]. Computer Science, 2002, 1(4):1-28. [17] PETERSON L E. K-nearest neighbor[J]. Scholarpedia, 2009, 4(2): 1883. [18] LANGLEY P, THOMPSON K. An analysis of Bayesian classifiers[C]// Proceedings of the 10th National Conference on Artificial Intelligence. San Jose, California: AAAI, 1992:223-228. [19] 郭春. 基于数据挖掘的网络入侵检测关键技术研究[D]. 北京:北京邮电大学, 2014.(GUO C. Research on key technology of network intrusion detection based on data mining [D]. Beijing: Beijing University of Posts and Telecommunications, 2014. [20] HOLMES G, DONKIN A, WITTEN I H. WEKA: a machine learning workbench[C]// Proceedings of the 2nd Australian and New Zealand Conference on Intelligent Information Systems. Piscataway, NJ: IEEE, 2002:357-361. |