[1]DARTIQUE C, JANG H, ZENG W. A new data-mining based approach for network intrusion detection[C]// Proceedings of the 7th Annual Conference on Communication Networks and Services Research. Washington, DC: IEEE Computer Society, 2009: 372-377.[2]ZAMAN S, KARRAY F. Lightweight IDS based on features selection and IDS classification scheme[C]// Proceedings of the 12th International Conference on Computational Science and Engineering. Washington, DC: IEEE Computer Society, 2009: 365-370.[3]朱红萍, 巩青歌, 雷战波. 基于遗传算法的入侵检测特征选择[J]. 计算机应用研究, 2012, 29(4): 1417-1419.[4]李超, 李文法, 段洣毅. 用于网络入侵检测的VFSA-C4.5特征选择算法[J]. 高技术通讯, 2011, 21(12): 1420-1425.[5]郑洪英, 侯梅菊, 王渝. 入侵检测中的快速特征选择方法[J]. 计算机工程, 2010, 36(6): 262-264.[6]吴春琼. 基于特征选择的网络入侵检测模型[J]. 计算机仿真, 2012, 29(6): 136-139.[7]HAN K H, KIM J H. Quantum-inspired evolutionary algorithm for a class of combinatorial optimization [J]. IEEE Transactions on Evolutionary Computation, 2002, 6(6): 580-593.[8]姚旭, 王晓丹, 张玉玺, 等. 特征选择方法综述[J]. 控制与决策, 2012, 27(2): 162-166.[9]LI Y Y, ZHAO J J, JIAO L C. Quantum-inspired evolutionary multicast algorithm[C]// Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics. Piscataway: IEEE Press, 2009: 1496-1501.[10]张宗飞. 优化网络入侵特征库的量子进化算法[J]. 计算机应用, 2010, 30(8): 2142-2145.[11]HAN K H, KIM J H. Quantum-inspired evolutionary algorithm with a new termination criterion, Hε gate and two-phase scheme[J]. IEEE Transactions on Evolutionary Computation, 2004, 8(4): 156-169.[12]University of California, Irvine. KDD cup 1999 data[DB/OL]. [211-07-20]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. |