[1] 鄢喜爱,杨金民,常卫东.基于贝叶斯方法的计算机动态取证[J].计算机工程与设计,2009,30(20):4614-4616.[2] 张友东.网络取证技术研究[D].南京:南京航空航天大学,2007.[3] 陈友,程学旗,李洋,等.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651.[4] 肖立中,刘云翔.适合入侵检测的分步特征选择算法[J].计算机工程与应用,2010,46(11):81-84.[5] LIU H, YU L. Towards integrating feature selection algorithms for classification and clustering [J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(4): 491-502.[6] YU L, LIU H. Efficient feature selection via analysis of relevance and redundancy [J]. Journal of Machine Learning Research, 2004, 5(10): 1205-1224.[7] BAGLIOMI M, FURLETTI B, TURINI F. DrC4.5: Improving C4.5 by means of prior knowledge [C]// Proceedings of the 2005 ACM Symposium on Applied Computing. New York: ACM, 2005: 474-481.[8] 苟光磊,黄丽丰,邹航.基于信息增益的属性约简算法[J].重庆工学院学报,2007,21(6):90-92.[9] HALL M A. Correlation-based feature selection for discrete and numeric class machine learning [C]// Proceedings of the 17th International Conference on Machine Learning. San Francisco: Morgan Kaufmann Publishers, 2000: 359-366.[10] Information and Computer Science University of California. Irving KDD cup 1999 data [EB/OL]. [2010-09-20]. http: //kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html.[11] 罗敏.基于聚类和支持向量机的网络入侵检测研究[D].武汉:武汉大学,2003.[12] 何慧,苏一丹,覃华.基于信息增益的贝叶斯入侵检测模型优化的研究[J].计算机工程与科学,2006,28(6):3288-3290.[13] 令狐红英,陈梅,王翰虎,等.基于互信息可信度的贝叶斯网络入侵检测研究[J].计算机工程与设计,2009,30(14):38-40. |