[1] LIAO H, LIN C, LIN Y, et al. Intrusion detection system: a comprehensive review[J] . Journal of Network and Computer Applications, 2013, 36(1): 16-24. [2] KREUTZ D, RAMOS F M V, ESTEVES VERISSIMO P, et al. Software-defined networking: a comprehensive survey[J]. Proceedings of the IEEE, 2015, 103(1): 14-76. [3] AICKELIN U, DIPANKAR D. FENG G. Artificial immune systems[M]. Berlin: Springer, 2014: 187-211. [4] HUA Y, LI T, HU X, et al. A survey of artificial immune system based intrusion detection[J]. The Scientific World Journal, 2014, 2014(3): 156790. [5] FANG X, WANG L, KANG J, et al. On dendritic cell algorithm and its theoretical investigation[J]. Computer Science, 2015, 42(2): 131-133.(方贤进, 王丽, 康佳, 等. 树突细胞算法及其理论研究[J]. 计算机科学, 2015, 42(2): 131-133.) [6] SALMON H M, FARIAS C M D, LOUREIRO P, et al. Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques[J]. International Journal of Wireless Information Networks, 2013, 20(1): 39-66. [7] FENG G, GREENSMITH J, AICKELIN U. The dendritic cell algorithm for intrusion detection[M]. IGI Global: Bio-Inspired Communications and Networking, 2011: 84-102. [8] ZONG W, HUANG G, CHEN Y. Weighted extreme learning machine for imbalance learning[J]. Neurocomputing, 2013, 101(3): 229-242. [9] LIN W J, CHEN J J. Class-imbalanced classifiers for high-dimensional data[J]. Briefings in Bioinformatics, 2013, 14(1): 13-26. [10] HE Q, LI N, LUO W, et al. A survey of machine learning algorithms for big data[J]. Pattern Recognition and Artificial Intelligence, 2014, 27(4): 327-336. (何清, 李宁, 罗文娟, 等. 大数据下的机器学习算法综述[J]. 模式识别与人工智能, 2014, 27(4): 327-336.) [11] JAEHAK Y, LEE H, KIM M S, et al. Traffic flooding attack detection with SNMP MIB using SVM[J]. Computer Communications, 2008, 31(17): 4212-4219. [12] JIANG C, ZHANG G, LI Z. Abnormal intrusion detection for embedded network system based on genetic algorithm optimised SVM[J]. Computer Applications and Software, 2011, 28(2): 287-289. (姜春茂, 张国印, 李志聪. 基于遗传算法优化SVM的嵌入式网络系统异常入侵检测[J]. 计算机应用与软件, 2011, 28(2): 287-289.) [13] NIE P, ZANG L, LIU L. Application of multi-class classification algorithm based on twin support vector machine in intrusion detection[J]. Journal of Computer Applications, 2013, 33(2): 426-429. (聂盼盼, 臧洌, 刘雷雷. 基于对支持向量机的多类分类算法在入侵检测中的应用[J]. 计算机应用, 2013, 33(2): 426-429.) [14] VLADIMIR V. The nature of statistical learning theory[M]. Berlin: Springer Science & Business Media, 2000: 2-6. [15] HE J, ZHENG S. Intrusion detection model with twin support vector machines[J]. Journal of Shanghai Jiaotong University: Science, 2014, 19(4): 448-454. [16] MANGASARIAN O L. Nonlinear programming[M]. [S.l.]: Society for Industrial and Applied Mathematics, 1993: 10. [17] KURT A K, HALL L O, GOLDGOF D B, et al. Fast support vector machines for continuous data[J]. IEEE Transactions on Systems, Man, and Cybernetics, 2009, 39(4): 989-1001. |