| [1] | DENNING D E.An intrusion-detection model[J].IEEE Transactions on Software Engineering,1987,13(2):222-232. | 
																													
																							| [2] | XIE Juanying,GAO Hongchao.Statistical correlation and K-means based distinguishable gene subset selection algorithms[J].Journal of Software,2014,25(9):2050-2075.(in Chinese)谢娟英,高红超.基于统计相关性与K-means的区分基因子集选择算法[J].软件学报,2014,25(9):2050-2075. | 
																													
																							| [3] | XIE Juanying,XIE Weixin.Several feature selection algorithms based on the discernibility of a feature subset and support vector machines[J].Chinese Journal of Computers,2014,37(8):1704-1718.(in Chinese)谢娟英,谢维信.基于特征子集区分度与支持向量机的特征选择算法[J].计算机学报,2014,37(8):1704-1718. | 
																													
																							| [4] | ZHANG Sicong,XIE Xiaoyao,XU Yang.Intrusion detection method based on a deep convolutional neural network[J].Journal of Tsinghua University(Science and Technology),2019,59(1):44-52.(in Chinese)张思聪,谢晓尧,徐洋.基于dCNN的入侵检测方法[J].清华大学学报(自然科学版),2019,59(1):44-52. | 
																													
																							| [5] | GU B,SHENG V S,TAY K Y,et al.Incremental support vector learning for ordinal regression[J].IEEE Transactions on Neural Networks and Learning Systems,2014,26(7):1403-1416. | 
																													
																							| [6] | LI Xiangna,AI Qing,QIN Yuping,et al.Summary of SVM incermental learning algorithm[J].Journal of Bohai University(Natural Science Edition),2007,28(2):187-189.(in Chinese)李祥纳,艾青,秦玉平,等.支持向量机增量学习算法综述[J].渤海大学学报(自然科学版),2007,28(2):187-189. | 
																													
																							| [7] | WU Xiaonian,PENG Xiaojin,YANG Yuyang,et al.Two-level feature selection method based on SVM for intrusion detection[J].Journal on Communications,2015,36(4):23-30.(in Chinese)武小年,彭小金,杨宇洋,等.入侵检测中基于SVM的两级特征选择方法[J].通信学报,2015,36(4):23-30. | 
																													
																							| [8] | GARCIA S,DERRAC J,CANO J R,et al.Prototype selection for nearest neighbor classification:taxonomy and empirical study[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2011,34(3):417-435. | 
																													
																							| [9] | LI Yinhui,XIA Jingbo,ZHANG Silan,et al.An efficient intrusion detection system based on support vector machines and gradually feature removal method[J].Expert Systems with Applications,2012,39(1):424-430. | 
																													
																							| [10] | BROWN R A.Building a balanced kd tree in O(kn log n) time[EB/OL].[2019-01-02].https://arxiv.org/pdf/1410.5420.pdf. | 
																													
																							| [11] | WANG Hao,HUA Jixue,FAN Xiaoshi.Intrusion detection technology based on twin support vector machine[J].Journal of Shandong University(Engineering Science),2013,43(6):53-56,64.(in Chinese)王昊,华继学,范晓诗.基于双联支持向量机的入侵检测技术[J].山东大学学报(工学版),2013,43(6):53-56,64. | 
																													
																							| [12] | CHITRAKAR R,HUANG C.Selection of candidate support vectors in incremental SVM for network intrusion detection[J].Computers & Security,2014,45:231-241. | 
																													
																							| [13] | ZHANG Xiuzhen,LI Yuxuan,KOTAGIRI R,et al.KRNN:k rare-class nearest neighbour classification[J].Pattern Recognition,2017,62:33-44. | 
																													
																							| [14] | CAO Jing.Research and application of three decision KNN algorithm based on incremental learning[D].Xi'an:Xi'an University of Technology,2018.(in Chinese)曹婧.基于增量学习的三支决策KNN算法的研究与应用[D].西安:西安理工大学,2018. | 
																													
																							| [15] | CHE Huimin,DING Bo,WANG Huaimin,et al.IKNN-SVM:a hybrid incremental algorithm for image classification[C]//Proceedings of the 2nd International Conference on Artificial Intelligence and Industrial Engineering.[S.l.]:Atlantis Press,2016:1-5. | 
																													
																							| [16] | SU Mingyang.Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification[J].Journal of Network and Computer Applications,2011,34(2):722-730. | 
																													
																							| [17] | TAVALLAEE M,BAGHERI E,LU W,et al.A detailed analysis of the KDD CUP99 data set[C]//Proceedings of 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.Washington D.C.,USA:IEEE Press,2009:1-6. | 
																													
																							| [18] | BOLON-CANEDO V,SANCHEZ-MARONO N,ALONSO-BETANZOS A.Feature selection and classification in multiple class datasets:an application to KDD CUP99 dataset[J].Expert Systems with Applications,2011,38(5):5947-5957. | 
																													
																							| [19] | SIDDIQUI M K,NAAHID S.Analysis of KDD CUP99 dataset using clustering based data mining[J].International Journal of Database Theory and Application,2013,6(5):23-34. | 
																													
																							| [20] | KRIZHEVSKY A,SUTSKEVER I,HINTON G E.Imagenet classification with deep convolutional neural networks[C]//Proceedings of the 25th International Conference on Neural Information Processing Systems.New York,USA:ACM Press,2012:1097-1105. | 
																													
																							| [21] | YIN Yabo,YANG Wenzhong,YANG Huiting,et al.Research on short text classification algorithm based on convolutional neural network and KNN[J].Computer Engineering,2018,44(7):193-198.(in Chinese)殷亚博,杨文忠,杨慧婷,等.基于卷积神经网络和KNN的短文本分类算法研究[J].计算机工程,2018,44(7):193-198. | 
																													
																							| [22] | LIU Yuefeng,CAI Shuang,YANG Hanxi,et al.Network intrusion detection method integrating CNN and BiLSTM[J].Computer Engineering,2019,45(12):127-133.(in Chinese)刘月峰,蔡爽,杨涵晰,等.融合CNN与BiLSTM的网络入侵检测方法[J].计算机工程,2019,45(12):127-133. |