参考文献
[1] Mabu S, Chen Ci, Lu Nannan, et al. An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming[J]. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2011, 41(1): 130-139.
[2] Han Sang-Jun, Cho Sung-Bae. Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program[J]. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 2005, 36(3): 559-570.
[3] Parikh D, Chen T. Data Fusion and Cost Minimization for Intrusion Detection[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 381-389.
[4] 肖立中, 邵志清, 马汉华, 等. 网络入侵检测中的自动决定聚类数算法[J]. 软件学报, 2008, 19(8): 2140-2148.
[5] 田志宏, 张永铮, 张伟哲, 等. 基于模式挖掘和聚类分析的自适应告警关联[J]. 计算机研究与发展, 2009, 46(8): 1304- 1315.
[6] Mehrabian A R, Lucas C. A Novel Numerical Optimization Algorithm Inspired from Weed Colonization[J]. Ecological Informatics, 2006, 1(4): 355-366.
[7] Kundu D, Suresh K, Ghosh S, et al. Multi-objective Optimi- zation with Artificial Weed Colonies[J]. Information Sciences, 2011, 181(12): 2441-2454.
[8] Roy G G, Das S, Chakraborty P, et al. Design of Non-Uniform Circular Antenna Arrays Using a Modified Invasive Weed Optimization Algorithm[J]. IEEE Transactions on Antennas and Propagation, 2011, 59(1): 110-118.
[9] Ahmadi M, Mojallali H. Chaotic Invasive Weed Optimization Algorithm with Application to Parameter Estimation of Chaotic Systems[J]. Chaos, Solitons & Fractals, 2012, 45(9/10): 1108-1120.
[10] de Almeida C W D, de Souza R M C R, Candeias A L B. Fuzzy Kohonen Clustering Networks for Interval Data[J]. Neuro- computing, 2012, 99(1): 65-75.
[11] Chen Na, Xu Zeshui, Xia Meimei. Correlation Coefficients of Hesitant Fuzzy Sets and Their Applications to Clustering Analysis[J]. Applied Mathematical Modelling, 2012, 37(4): 2197-2211.
[12] 樊 玫. 基于Kohonen神经网络的用户访问模式挖掘模型的研究[D]. 南昌: 南昌大学, 2007.
[13] 舒远仲, 吴文俊, 陈忠贵. 改进的蚂蚁聚类入侵检测方 法[J]. 计算机工程, 2011, 37(6): 127-129.
[14] 李文华. 基于聚类分析的网络入侵检测模型[J]. 计算机工程, 2011, 37(17): 96-98.
编辑 金胡考 |