[1] |
DENNING D E.An intrusion-detection model[J].IEEE Transactions on Software Engineering,1987,13(2):222-232.
|
[2] |
XIE Juanying,GAO Hongchao.Statistical correlation and K-means based distinguishable gene subset selection algorithms[J].Journal of Software,2014,25(9):2050-2075.(in Chinese)谢娟英,高红超.基于统计相关性与K-means的区分基因子集选择算法[J].软件学报,2014,25(9):2050-2075.
|
[3] |
XIE Juanying,XIE Weixin.Several feature selection algorithms based on the discernibility of a feature subset and support vector machines[J].Chinese Journal of Computers,2014,37(8):1704-1718.(in Chinese)谢娟英,谢维信.基于特征子集区分度与支持向量机的特征选择算法[J].计算机学报,2014,37(8):1704-1718.
|
[4] |
ZHANG Sicong,XIE Xiaoyao,XU Yang.Intrusion detection method based on a deep convolutional neural network[J].Journal of Tsinghua University(Science and Technology),2019,59(1):44-52.(in Chinese)张思聪,谢晓尧,徐洋.基于dCNN的入侵检测方法[J].清华大学学报(自然科学版),2019,59(1):44-52.
|
[5] |
GU B,SHENG V S,TAY K Y,et al.Incremental support vector learning for ordinal regression[J].IEEE Transactions on Neural Networks and Learning Systems,2014,26(7):1403-1416.
|
[6] |
LI Xiangna,AI Qing,QIN Yuping,et al.Summary of SVM incermental learning algorithm[J].Journal of Bohai University(Natural Science Edition),2007,28(2):187-189.(in Chinese)李祥纳,艾青,秦玉平,等.支持向量机增量学习算法综述[J].渤海大学学报(自然科学版),2007,28(2):187-189.
|
[7] |
WU Xiaonian,PENG Xiaojin,YANG Yuyang,et al.Two-level feature selection method based on SVM for intrusion detection[J].Journal on Communications,2015,36(4):23-30.(in Chinese)武小年,彭小金,杨宇洋,等.入侵检测中基于SVM的两级特征选择方法[J].通信学报,2015,36(4):23-30.
|
[8] |
GARCIA S,DERRAC J,CANO J R,et al.Prototype selection for nearest neighbor classification:taxonomy and empirical study[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2011,34(3):417-435.
|
[9] |
LI Yinhui,XIA Jingbo,ZHANG Silan,et al.An efficient intrusion detection system based on support vector machines and gradually feature removal method[J].Expert Systems with Applications,2012,39(1):424-430.
|
[10] |
BROWN R A.Building a balanced kd tree in O(kn log n) time[EB/OL].[2019-01-02].https://arxiv.org/pdf/1410.5420.pdf.
|
[11] |
WANG Hao,HUA Jixue,FAN Xiaoshi.Intrusion detection technology based on twin support vector machine[J].Journal of Shandong University(Engineering Science),2013,43(6):53-56,64.(in Chinese)王昊,华继学,范晓诗.基于双联支持向量机的入侵检测技术[J].山东大学学报(工学版),2013,43(6):53-56,64.
|
[12] |
CHITRAKAR R,HUANG C.Selection of candidate support vectors in incremental SVM for network intrusion detection[J].Computers & Security,2014,45:231-241.
|
[13] |
ZHANG Xiuzhen,LI Yuxuan,KOTAGIRI R,et al.KRNN:k rare-class nearest neighbour classification[J].Pattern Recognition,2017,62:33-44.
|
[14] |
CAO Jing.Research and application of three decision KNN algorithm based on incremental learning[D].Xi'an:Xi'an University of Technology,2018.(in Chinese)曹婧.基于增量学习的三支决策KNN算法的研究与应用[D].西安:西安理工大学,2018.
|
[15] |
CHE Huimin,DING Bo,WANG Huaimin,et al.IKNN-SVM:a hybrid incremental algorithm for image classification[C]//Proceedings of the 2nd International Conference on Artificial Intelligence and Industrial Engineering.[S.l.]:Atlantis Press,2016:1-5.
|
[16] |
SU Mingyang.Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification[J].Journal of Network and Computer Applications,2011,34(2):722-730.
|
[17] |
TAVALLAEE M,BAGHERI E,LU W,et al.A detailed analysis of the KDD CUP99 data set[C]//Proceedings of 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.Washington D.C.,USA:IEEE Press,2009:1-6.
|
[18] |
BOLON-CANEDO V,SANCHEZ-MARONO N,ALONSO-BETANZOS A.Feature selection and classification in multiple class datasets:an application to KDD CUP99 dataset[J].Expert Systems with Applications,2011,38(5):5947-5957.
|
[19] |
SIDDIQUI M K,NAAHID S.Analysis of KDD CUP99 dataset using clustering based data mining[J].International Journal of Database Theory and Application,2013,6(5):23-34.
|
[20] |
KRIZHEVSKY A,SUTSKEVER I,HINTON G E.Imagenet classification with deep convolutional neural networks[C]//Proceedings of the 25th International Conference on Neural Information Processing Systems.New York,USA:ACM Press,2012:1097-1105.
|
[21] |
YIN Yabo,YANG Wenzhong,YANG Huiting,et al.Research on short text classification algorithm based on convolutional neural network and KNN[J].Computer Engineering,2018,44(7):193-198.(in Chinese)殷亚博,杨文忠,杨慧婷,等.基于卷积神经网络和KNN的短文本分类算法研究[J].计算机工程,2018,44(7):193-198.
|
[22] |
LIU Yuefeng,CAI Shuang,YANG Hanxi,et al.Network intrusion detection method integrating CNN and BiLSTM[J].Computer Engineering,2019,45(12):127-133.(in Chinese)刘月峰,蔡爽,杨涵晰,等.融合CNN与BiLSTM的网络入侵检测方法[J].计算机工程,2019,45(12):127-133.
|