[1]YAN X, TAN M, YAN Y, et al. Research on hidden Markov model-based and neural network-based intrusion detections[J]. Computer Applications and Software, 2012, 29(2):294-297.(闫新娟,谭敏生,严亚周,等. 基于隐马尔可夫模型和神经网络的入侵检测研究[J]. 计算机应用与软件,2012,29(2):294-297.)
[2]JIANG C, ZHANG G, LI Z. Abnormal intrusion detection for embedded network system based on genetic algorithm optimised SVM[J]. Computer Applications and Software, 2011,28(2):287-289.(姜春茂,张国印,李志聪. 基于遗传算法优化SVM的嵌入式网络系统异常入侵检测[J]. 计算机应用与软件,2011,28(2):287-289.)
[3]JING X, WANG H, NIE K, et al. Feature selection algorithm based on IMGA and MKSVM to intrusion detection[J].Computer Science, 2012,39(7):96-100. (井小沛,汪厚祥,聂凯,等. 面向入侵检测的基于IMGA和MKSVM的特征选择算法[J]. 计算机科学,2012,39(7):96-100.)
[4]MU Q, BI X, SHE X. Feature selection method for network intrusion based on GQPSO algorithm[J].Computer Engineering,2011,37(14):103-16.(牟琦,毕孝儒,厍向阳. 基于GQPSO算法的网络入侵特征选择方法[J]. 计算机工程,2011,37(14):103-16.)
[5]DENNING D E. An intrusion detection model [J]. IEEE Transactions on Software Engineering, 2010, 13(2): 222-232.
[6]HANG C L, WANG C J. A GA-based feature selection and parameters optimization for support vector machines [J]. Expert Systems with Applications, 2009, 31(2):231-240.
[7]WANG H, MA R. Optimization of neural networks for network intrusion detection[C]// ETCS 2009: Proceedings of the 1st International Workshop on Education Technology and Computer Science. Piscataway: IEEE Press, 2009:418-420.
[8]ZHANG X, GU C. A method to extract network intrusion detection feature[J]. Journal of South China University of Technology: Natural Science, 2010,38(1):81-85(张雪芹,顾春华. 一种网络入侵检测特征提取方法[J]. 华南理工大学学报:自然科学版,2010,38(1):81-85.)
[9]GUO W, CHEN G, CHEN Q, et al. Feature subset selection based on particle swarm optimization algorithm and relevance analysis[J]. Computer Science, 2008, 35(2):144-146.(郭文忠,陈国龙,陈庆良,等. 基于粒子群优化算法和相关性分析的特征子集选择[J]. 计算机科学,2008,35(2):144-146.)
[10]MUKHERJEE B, HEBERLEIN L T, LEVITT K N. Network intrusion detection [J]. IEEE Network, 1994, 8(3):26-41.
[11]MITRA P, MURTHY C A, PAL S K. Unsupervised feature selecdonusing feature similarity[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002,3(14):301-312.
[12]CHEN S, CHEN G, GUO W, et al. Feature selection of the intrusion detection data based on particle swarm optimization and neighborhood reduction[J]. Journal of Computer Research and Development, 2010,47(7);1261-1267(陈仕涛,陈国龙,郭文忠,等. 基于粒子群优化和邻域约简的入侵检测日志数据特征选择[J]. 计算机研究与发展,2010,47(7);1261-1267.)
[13]LI Y, FANG B, GUO L, et al. Network anomaly detection based on TCM-KNN and genetic algorithm[J]. Journal on Communications, 2007,28(12):48-52.(李洋,方滨兴,郭莉,等. 基于TCM-KNN和遗传算法的网络异常检测技术[J].通信学报,2007,28(12):48-52.) |