参考文献
[1]李洋,方滨兴,郭莉,等.基于直推式方法的网络异常检测方法[J].软件学报,2007,18(10):2595-2604.
[2]钱叶魁,陈鸣,叶立新,等.基于多尺度主成分分析的全网络异常检测方法[J].软件学报,2012,23(2):361-377.
[3]魏小涛,黄厚宽,田盛丰.在线自适应网络异常检测系统模型与算法[J].计算机研究与发展,2010,47(3):485-492.
[4]贾伟峰,刘凌霞,张凤荔.近邻保持降维技术在网络异常检测中的应用[J].计算机工程与应用,2010,46(35):101-103.
[5]刘白璐,杨雅辉,沈晴霓,等.网络入侵早期检测方法的研究与实现 [J].计算机工程,2013,39(7):1-6.
[6]舒远仲,吴文俊,陈忠贵.改进的蚂蚁聚类入侵检测方 法[J].计算机工程,2011,37(6):127-129.
[7]李文华.基于聚类分析的网络入侵检测模型[J].计算机工程,2011,37(17):96-98.
[8]Eskin E,Arnold A,Prerau M,et al.A Geometric Framework for Unsupervised Anomaly Detection:Detecting Intrusions in Unlabeled Data[M].Boston,USA:Kluwer Academic Publishers,2002.
[9]Barbara D,Domeniconi C,Rogers J P.Detecting Outliers Using Transduction and Statistical Test-ing[C]//Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2006:1
-12.
[10]Vapnik V N.Statistical Learning Theory[M].New York,USA:John Wiley and Sons,1998.
[11]Proedru K,Nouretdinov I,Vovk V,et al.Transductive Confidence Machine for Pattern Recognition[C]// Proceedings of the 13th European Conference on Machine Learning.Helsinki,Finland:Springer,2002:221-229.
[12]Gammerman A,Vovk V,Vapnik V.Learning by Transduction[C]//Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence.San Francisco,USA:Morgan Kaufmann,1998:269-278.
[13]Vovk V,Gammerman A,Shafer G.Algorithmic Learning in a Random World[M].New York,USA:Springer,2005.
[14]Vovk V,Gammerman A,Saunders C.Machine-learning Applications of Algorithmic Randomness[C]//Proceedings of the 16th International Conference on Machine Learning.San Francisco,USA:Morgan Kaufmann,1999:325-332.
[15]Vovk V,Gammerman A.Statistical Applications of Algorithmic Randomness[Z].Bulletin of the Inter-national Statistical Institute,1999.
[16]Saunders C,Gammerman A,Vovk V.Transduction with Confidence and Credibility[C]//Proceedings of the 16th International Joint Conference on Artificial Intelligence.San Francisco,USA:Morgan Kaufmann,1999:226-237.
[17]Saunders C,Gammerman A,Vovk V.Computationally Efficient Transductive Machines[C]//Proceedings of the 11th International Conference on Algorithmic Learning Theory.Heidelberg,Germany:Springer,2000:524-533.
[18]Pawlak Z.Rough Sets[J].International Journal of Parallel Programming,1982,11(5):341-356.
[19]Li Xiangjun,Rao Fen.Outlier Detection Using the Information Entropy of Neighborhood Rough Sets[J].Journal of Information & Computational Science,2012,12(9):3339-3350.
[20]陈玉明,吴克寿,李向军.一种基于信息熵的异常数据挖掘算法[J].控制与决策,2013,28(6):867-872.
[21]Hawkins D.Identification of Outliers[M].London,UK:Chapman and Hall,1980.
[22]张新有,曾华燊,贾磊.入侵检测数据集 KDD CUP 99研究[J].计算机工程与设计,2010,31(22):4809-4812.
编辑索书志 |