参考文献
[1]Ghosh K,Srinivasan R.Immune-system-inspired App-roach to Process Monitoring and Fault Diag-nosis[J].Industrial & Engineering Chemistry Research,2010,50(3):1637-1651.
[2]刘海龙,张凤斌,席亮.基于协同进化的免疫检测器分布优化算法[J].计算机工程,2013,39(11):154-157.
[3]Elhag S,Fernández A,Bawakid A,et al.On the Com-bination of Genetic Fuzzy Systems and Pairwise Learning for Improving Detection Rates on Intrusion Detection Systems[J].Expert Systems with Applica-tions,2015,42(1):193-202.
[4]Oriola O,Adeyemo A B,Robert A B C.Distributed Intrusion Detection System Using P2P Agent Mining Scheme[J].African Journal of Computing & ICT,2012,5(2):3-10.
[5]Idrees F,Rajarajan M,Memon A Y.Framework for Distributed and Self-healing Hybrid Intrusion Detec-tion and Prevention System[C]//Proceedings of International Conference on ICT Convergence.Washington D.C.,USA:IEEE Press,2013:277-
282.
[6]Daoudi M,Ahmed-Nacer M.An Intrusion Detection Approach Using an Adaptative Parameter-free Algori-thm[C]//Proceedings of the 9th International Conference on Systems.Nice,France:International Academy Research and Industry
Association,2014:178-184.
[7]Mitchell R,Chen Ing-ray.A Survey of Intrusion Detec-tion Techniques for Cyber-physical Systems[J].ACM Computing Surveys,2014,46(4):55-85.
[8]Alruwaili F F,Gulliver A.CCIPS:A Cooperative Intrusion Detection and Prevention Framework for Cloud Services[J].International Journal of Latest Trends in Computing,2014,4(4):151-158.
[9]Shelke M P K,Sontakke M S,Gawande A D.Intrusion Detection System for Cloud Computing[J].International Journal of Scientific & Technology Research,2012,1(4):67-71.
(下转第185页)
(上接第178页)
[10]Kumar S,Dalal S.Optimizing Intrusion Detection System Using Genetic Algorithm[J].International Journal of Re-search Aspects of Engineering and Management,2014,1(1):42-45.
[11]李占波,白全海,申义彩.基于主成分分析的网络入侵检测算法[J].计算机工程,2013,39(5):152-155.
[12]Kumar A,Sindhwani V,Kambadur P.Fast Conical Hull Algorithms for Near-separable Non-negative Matrix Factori-zation[C]//Proceedings of the 30th International Con-ference on Machine Learning.Berlin,Germany:Springer,2012:1-12.
[13]刘积芬.非负矩阵分解降维的入侵检测方法[J].计算机工程与应用,2012,48(30):117-121.
[14]刘维湘,郑南宁,游屈波.非负矩阵分解及其在模式识别中的应用[J].科学通报,2006,51(3):241-250.
[15]Recht B,Re C,Tropp J,et al.Factoring Nonnegative Matrices with Linear Programs:Advances in Neural Information Processing Systems[C]//Proceedings of Neural Information Processing Systems
Conference.Berlin,Germany:Springer,2012:1214-1222.
[16]Eckstein J.NonlinearProximal Point Algorithms Using Breg-man Functions,with Applications to Convex Programming[J].Mathematics of Operations Research,1993,18(1):202-226.
[17]刘白璐,杨雅辉,沈晴霓,等.网络入侵早期检测方法的研究与实现[J].计算机工程,2013,39(7):1-6.
编辑顾逸斐 |