[1] PAN X L,LUO Y, XU Y T. K-nearest Neighbor.Based Structural Twin Support VectorMachine[J]. KnowledgeBase
System.2015, 88( 2015): 34-44
[2] Zhao Fuqun.Detection method of LSSVM network intrusion
based on hybrid kernel function[J].Modern Electronics Technique, 2015, 38(21): 96-99
[3] S. Chung, K Kim, A Heuristic Approach to Enhance the performance of Intrusion System using Machine Learning Algoriths[C] //Proceedings of the Korea Institutes of Information Security and Cryptology Conference. Korea:CISC,2015
[4] M. Tahir, W. Hassan, A. Md Said, et al. Hybrid machine learning technique For intrusion detection system[C] //5th International Conference on Comouting and Informatics .
Istanbul: ICOCI, 2015
[5] D. Shin, K. Choi, S. Chune, et al. Maliicious Traffic Detection Using K-means[J]. The Journal of Korean Institute of Communications and Information Sciences, 2016,41(2): 277-284
[6] Elidon Beqiri. Neural Networks for Intrusion Detection Systems[J]. Computer and Information Science Volume ,2009,45(3):156-165
[7] S Jha, K Tan, R A Maxion. Markov chains, classifiers and intrusion detection[C] //The 14th IEEE Computer Security Foundations Workshop. Canada:IEEE, 2001
[8] Bamakan ,Huadong, Shi Yong et al. Ramp loss K-Support Vector Classification Regression[J]. KNOWLEDGE BASED SYSTEMS,2017,126(10):113-126
[9] Horng S J, Su M Y, Chen Y H, et al. A novel Intrusion detection system based on hierarchical clustering and support vector machines[J]. Expert Systems with Applications, 2011, 38(1):306-313
[10] N Gao, L Gao, Q. Gao,et al. An Intrusion Detection
Model Based on Deep Belief Networks[C] //The 2th
International Conference on Advanced Cloud and Big
Data. Huangshan:CBD,2014
[11] 杨昆朋. 基于深度学习的入侵检测[D]. 北京: 北京交
通大学, 2015
[12] Raman,Somu,Nivethitha, et al. A Hypergraph and Arithmetic Residue-Based Probabilistic Neural Network for
classification in Intrusion Detection Systems[J].The official journal of the International Neural Network Society , 2017, 92(23): 89-97
[13] 张玲,白中英,罗守山等. 基于粗糙集和人工免疫的集
成入侵检测模型[J]. 通信学报,2013,34(9):166-175
[14] 张得生,张飞. 基于 SVM 和融合技术的入侵检测研究[J]. 科技通报,2013,29(5),167-172
[15] 李春林,黄月江,王宏等. 一种基于深度学习的网络入
侵检测方法[J]. 信息安全与通信保密,2014,(10):68-71
|