共 50 条
- [41] Network Packet Data Online Processing for Intrusion Detection System [J]. Proceeding of 2015 1st International Conference on Wireless and Telematics (ICWT), 2015,
- [42] Network intrusion detection based on artificial immune clustering [J]. Zhong, J. (zhongjiang@cqu.edu.cn), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
- [43] Research on the network intrusion detection based on the immune system [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 4479 - +
- [44] A Network Intrusion Detection Model Based on Artificial Immune [J]. NATURAL RESOURCES AND SUSTAINABLE DEVELOPMENT, PTS 1-3, 2012, 361-363 : 687 - 690
- [45] An Immune Based Relational Database Intrusion Detection Algorithm [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 295 - +
- [46] Intrusion Detection Models Based on Data Mining [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
- [47] Intrusion detection based on clustering a data stream [J]. Third ACIS International Conference on Software Engineering Research, Managment and Applications, Proceedings, 2005, : 220 - 227
- [48] A data mining based intrusion detection model [J]. INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
- [49] Intrusion detection system based on data mining [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
- [50] Intrusion detection system based on data mining [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405