[1] 文伟平, 卿斯汉, 蒋建春,等. 网络蠕虫研究与进展[J]. 软件学报, 2004,25(8): 1208–1219
[2] Anderson J P. Computer security threat monitoring and surveillance[J]. ResearchGate, 1980 [J/OL]. (1980-01-01)[2017-07-12]. https://www.researchgate.net/publication/239587894_Computer_Security_Threat_Monitoring_and_Surveillance
[3] Denning D E. An intrusion-detection model[J]. IEEE Trans on Software Engineering, 1987, SE-13(2): 222–232
[4] Lunt T F, Tamaru A, Gillham F. AReal-time Intrusion-Detection Expert System (IDES)[M]. Menio Park, CA :SRI International, Computer Science Laboratory, 1992
[5] Anderson D, Frivold T, Valdes A. Next-Generation Intrusion Detection Expert System (NIDES): A Summary[M]. Menio Park, CA: SRI International, Computer Science Laboratory, 1995
[6] Heberlein L T, Dias G V, Levitt K N, et al. A network security monitor[C]// Proc of IEEE Computer Society Symp on Research in Security and Privacy.Piscataway,NJ:IEEE, 1990: 296–304
[7] Cheung S, Crawford R, Dilger M, et al. The design of GrIDS: A graph-based intrusion detection system, CSE-99-2 [R]. UC Davis Computer Science Department,1999
[8] Staniford-Chen S, Tung B, Schnackenberg D, et al. The common intrusion detection framework (CIDF)[C]//Proc of the Information Survivability Workshop. 1998
[9] Tarakanov A O, Skormin V, Sokolova S P. Immunocomputing: Principles and Applications[M].Berlin: Springer,2013
[10] Siwak G, Siebenman T, Witt M. Intrusion Detection System[M]. 2016
[11] Liao H-J, Lin C-H R, Lin Y-C, et al. Intrusion detection system: A comprehensive review[J]. Journal of Network and Computer Applications, 2013, 36(1): 16–24
[12] Bhuyan M H, Bhattacharyya D K, Kalita J K. Network anomaly detection: methods, systems and tools[J]. Communications Surveys & Tutorials, 2014, 16(1): 303–336
[13] Lin S-W, Ying K-C, Lee C-Y et al. An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection[J]. Applied Soft Computing, 2012, 12(10): 3285–3290
[14] Li W, Mahadevan V, Vasconcelos N. Anomaly detection and localization in crowded scenes[J]. IEEE Trans on Pattern Analysis and Machine Intelligence, ,2014, 36(1): 18–32
[15] Fiore U, Palmieri F, Castiglione A, et al. Network anomaly detection with the restricted Boltzmann machine[J]. Neurocomputing, 2013, 122: 13–23
[16] Vespe M, Visentini I, Bryan K ,et al. Unsupervised learning of maritime traffic patterns for anomaly detection[C]//Proc of the 9th Data Fusion & Target Tracking Conf (DF&TT 2012): Algorithms & Applications. 2012: 1–5
[17] Amer M, Goldstein M, Abdennadher S. Enhancing one-class support vector machines for unsupervised anomaly detection[C]//Proc of ACM SIGKDD Workshop on Outlier Detection and Description.New York: ACM, 2013: 8–15
[18] Deorio A, Li Q, Burgess M, et al. Machine learning-based anomaly detection for post-silicon bug diagnosis[C]//Proc of Conf on Design, Automation and Test in Europe. EDA Consortium, 2013: 491–496
[19] Mascaro S, Nicholso A E, Korb K B. Anomaly detection in vessel tracks using Bayesian networks[J]. International Journal of Approximate Reasoning, 2014, 55(1): 84–98
[20] Sheikhan M, Jadidi Z. Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network[J]. Neural Computing and Applications, 2014, 24(3/4): 599–611
[21] Mitrokotsa A, Dimitrakakis C. Intrusion detection in MANET using classification algorithms: The effects of cost and model selection[J]. Ad Hoc Networks, 2013, 11(1): 226–237
[22] Jin H, Xiang G, Zou D, et al. A VMM-based intrusion prevention system in cloud computing environment[J]. The Journal of Supercomputing, 2013, 66(3): 1133–1151
[23] Aickelin U, Greensmith J, Twycross J. Immune system approaches to intrusion detection-A review (ICARIS)[J]. arXiv preprint arXiv:1305.7144, 2013
[24] Beham M, Vlad M, Reiser H P. Intrusion detection and honeypots in nested virtualization environments[C]//Proc of the 43rd Annual IEEE/IFIP Int Conf on Dependable Systems and Networks (DSN).Piscataway,NJ:IEEE, 2013: 1–6
|