[1] |
ZHANG Cuixiao,ZHANG Guobing,SUN Shanshan.A mixed unsupervised clustering based intrusion detection model[C]//Proceedings of the 3rd International Conference on Genetic and Evolutionary Computing.Washington D.C.,USA:IEEE Press,2009:426-428.
|
[2] |
MENG Jianliang,SHANG Haikun,BIAN Ling.The application on intrusion detection based on K-means cluster algorithm[C]//Proceedings of International Forum on Information Technology and Application.Washington D.C.,USA:IEEE Press,2009:150-152.
|
[3] |
PATHAK V,ANATHANARAYANA V S.A novel multi-threaded K-means clustering approach for intrusion detection[C]//Proceedings of 2012 IEEE International Conference on Software Engineering and Service Science.Washington D.C.,USA:IEEE Press,2012:757-760.
|
[4] |
LUO Min,WANG Lina,ZHANG Huanguo.An unsupervised clustering-based intrusion detection method[J].Acta Electronica Sini
|
[11] |
MUDA Z,YASSIN W,SULAIMAN M N,et al.Intrusion detection based on K-Means clustering and Naïve Bayes classification[C]//Proceedings of International Conference on Information Technology in Asia.Washington D.C.,USA:IEEE Press,2011:1-6.
|
[12] |
YASSIN W,UDZIR N,MUDA Z,et al.Anomaly-based intrusion detection through K-means clustering and Naives Bayes classification[C]//Proceedings of the 4th International Conference on Computing and Informatics.Washington D.C.,USA:IEEE Press,2013:298-303.
|
[13] |
FACHKHA C,HARB E B,DEBBABI M.Inferring distributed reflection denial of service attacks from darknet[J].Computer Communications,2015,62(1/2):59-71.
|
[14] |
CHANDRASEKHAR A,RAGHUVEER K.Intrusion detection technique by using K-means,fuzzy neural network and SVM classifiers[C]//Proceedings of International Conference on Computer Communication and Informatics.Washington D.C.,USA:IEEE Press,2013:1-7.
|
[15] |
YASEEN W A,OTHMAN Z,NAZRI M.Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system[J].Expert Systems with Applications,2017,6(7):296-303.
|
[16] |
HE Liang.An improved intrusion detection based on neural network and fuzzy algorithm[J].Journal of Networks,2014,9(5):1274-1280.
|
[17] |
WU Yuwen,LIU Hong,ZHA Hongbin.Facial expression recognition by weighted clustering of grouped features[J].Journal of Computer-Aided Design and Computer Graphics,2005,17(11):2394-2401.(in Chinese)武宇文,刘宏,查红彬.基于特征分组加权聚类的表情识别[J].计算机辅助设计与图形学学报,2005,17(11):2394-2401.
|
[18] |
QUINLAN J R.Induction of decision trees[J].Machine Learning,1986,1(1):81-106.
|
[19] |
QUINLAN J R.C4.5:programs for machine learning[M].[S.l.]:Morgan Kaufmann Publisher,1993.
|
[20] |
HETTICH S,BAY S D.KDD cup 1999 data[EB/OL].[2019-03-20].http://kdd.ics.uci.edu/databases/kdd cup99/kdd cup99.html.
|
[21] |
BOUZIDA Y,CUPPENS F,BOULAHIA N C,et al.Efficient intrusion detection using principal component analysis[C]//Proceedings of 2010 International Conference on Engineering System Management and Applications.Washington D.C.,USA:IEEE Press,2010:256-268.
|