[1] GU X, WANG H, NI T, et al. Detection of application-layer DDoS attack based on time series analysis [J]. Journal of Computer Applications, 2013,33(8):2228-2231.(顾晓清,王洪元,倪彤光,等.基于时间序列分析的应用层DDoS攻击检测[J].计算机应用,2013,33(8):2228-2231.) [2] WANG L, TENG S. Application of clustering and time-based sequence analysis in intrusion detection [J]. Journal of Computer Applications, 2010,30(3):699-701.(王令剑,滕少华.聚类和时间序列分析在入侵检测中的应用[J].计算机应用,2010,30(3):699-701.) [3] KAVITHA B, KARTHIKEYAN D S, MAYBELL P S. An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier [J]. Knowledge-Based Systems, 2012,28(4):88-96. [4] HUANG H, SUN H. Network intrusion detection based on particle swarm optimization algorithm and information gain [J]. Journal of Computer Applications, 2014,34(6):1686-1688.(黄会群,孙虹.粒子群选择特征和信息增益确定特征权值的入侵检测[J].计算机应用,2014,34(6):1686-1688.) [5] MRUTYUNJAYA P, AJITH A, MANAS R P. A hybrid intelligent approach for network intrusion detection [J]. Procedia Engineering, 2012,30(1):1-9. [6] HUWAIDA T E, IZZELDIN M O. Alert correlation in collaborative intelligent intrusion detection systems[J]. Applied Soft Computing, 2011,11(7):4349-4365. [7] BENGIO Y. Learning deep architectures for AI [J]. Foundations and Trends in Machine Learning, 2009,2(1):1-127. [8] HINTON G E, SALAKHUTDINOV R R. Reducing the dimensionality of data with neural networks [J]. Science, 2006,313(5786):504-507. [9] SALAKHUTDINOV R, HINTON G. An efficient learning procedure for deep Boltzmann machines[J]. Neural Computation, 2012,24(8):1967-2006. [10] HUANG G B, ZHU Q Y, SIEW C K. Extreme learning machine: theory and applications [J]. Neurocomputing, 2006,70(1):489-501. [11] KUANG F, XU W, ZHANG S, et al. A novel approach of KPCA and SVM for intrusion detection [J]. Journal of Computational Information Systems, 2012,8(8):3237-3244. [12] ARYA A, KUMAR S. Information theoretic feature extraction to reduce dimensionality of genetic network programming based intrusion detection model [C]//Proceedings of the 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques. Piscataway: IEEE, 2014:34-37. [13] HOU G, MA X, ZHANG Y. A new method for intrusion detection using manifold learning algorithm [J]. Telkomnika Indonesian Journal of Electrical Engineering, 2013,11(12):7339-7343. [14] CHEN J G, LI Z X. Artificial neural network based intrusion detection method combined with manifold learning algorithm [J]. Applied Mechanics and Materials, 2012,121-126:3170-3174. [15] HEYI W, AIQUN H, YUBO S, et al. A new intrusion detection feature extraction method based on complex network theory [C]//Proceedings of the 2012 4th International Conference on Multimedia Information Networking and Security. Piscataway: IEEE, 2012:852-856. [16] XU Q, YANG L. A supervised local decision hierarchical support vector machine based anomaly intrusion detection method [J]. Journal of Electronics and Information Technology, 2010,32(10):2383-2387.(徐琴珍,杨绿溪.一种基于有监督局部决策分层支持向量机的异常检测方法[J].电子与信息学报,2010,32(10):2383-2387.) [17] HAWELIYA J, NIGAM B. Network intrusion detection using semi supervised support vector machine [J]. International Journal of Computer Applications, 2014,85(9):27-31. [18] CASAS P, MAZEL J, OWEZARSKI P. Unsupervised network intrusion detection systems: detecting the unknown without knowledge [J]. Computer Communications, 2012,35(7):772-783. [19] CASAS P, MAZEL J, OWEZARSKI P. Knowledge-independent traffic monitoring: unsupervised detection of network attacks [J]. IEEE Network, 2012,26(1):13-21. [20] KASUN L L C, ZHOU H, HUANG G B, et al. Representational learning with ELMs for big data [J]. IEEE Intelligent Systems, 2013,28(6):31-34. [21] HUANG G B, ZHOU H, DING X, et al. Extreme learning machine for regression and multiclass classification [J]. IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, 2012,42(2):513-529. [22] WIDROW B, GREENBLATT A, KIM Y, et al. The No-Prop algorithm: a new learning algorithm for multilayer neural networks [J]. Neural Networks, 2013,37:182-188. [23] JOHNSON W B, LINDENSTRAUSS J, SCHECHTMAN G. Extensions of Lipschitz maps into Banach spaces [J]. Israel Journal of Mathematics,1986,54(2):129-138. |