[1]肖敏,韩继军,肖德宝,等.基于聚类的入侵检测研究综述[J].计算机应用,2008,28(6): 34-38.[2]PORTNOY L, ESKIN E, STOLFO S J. Intrusion detection with unlabeled data using clustering[C]// Proceedings of ACM CSS Workshop on Data Mining Applied to Security. New York: ACM, 2001: 123-130.[3]ROSCOE A W. WOODCOCK J C P, WULF L. Non-interference through determinism[J].Journal of Computer Security, 1996, 4(1):27-54.[4]向继,高能,荆继武.聚类算法在网络入侵检测中的应用[J].计算机工程,2003,29(16):48-185.[5]王令剑,腾少华.聚类和时间序列分析在入侵检测中的应用[J].计算机应用,2010, 30(3):699-701.[6]KANNAN R, VEMPALA S, VETTA A. On clusterings: Good, bad and spectral [J]. Journal of the ACM, 2004, 51(3): 497-515.[7]HARTUV E, SHAMIR R. A clustering algorithm based on group connectivity [J].Information Processing Letters, 2000,76(4/5/6): 175-181.[8]NEWMAN M E J. Fast algorithm for detecting community structure in networks [J]. Physical Review E:Statistical, Nonlinear, and Soft Matter Physics,2004, 69(6): 5-10.[9]FLAKE G W, TARJAN R E, TSIOUTSIOULIKLIS K. Graph clustering and minimum cut trees [J]. Internet Mathematics, 2003, 1(4): 355-378.[10]蔺小林.计算方法[M].西安:西安电子科技大学出版社,2009.[11]蒋盛益,李庆华.聚类分析的差异性度量方法研究[J].计算机工程与应用,2005,25(4):146-149.[12]王洁松,张小飞.KDDCup99网络入侵检测数据的分析和预处理[J].科技信息, 2008(15): 407-408.[13]BOLEY D L. Principal direction divisive partitioning[J]. Data Mining and Knowledge Discovery, 1998, 2(4): 325-344. |