共 50 条
- [1] Application of Negative Selection Theory in Intrusion Detection [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 2763 - 2770
- [2] Using information theory in pattern recognition for intrusion detection [J]. Journal of Theoretical and Applied Information Technology, 2011, 34 (02): : 138 - 142
- [3] Application of rough set theory to intrusion detection system [J]. GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, 2007, : 562 - +
- [4] Rate distortion theory and its application in intrusion detection [J]. PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS AND BRAIN, VOLS 1-3, 2005, : 759 - 762
- [5] Application of Gray Theory and Data Fusion in Intrusion Detection [J]. 2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 4, 2010, : 131 - 135
- [6] Optimum response scheme of intrusion detection based on information theory [J]. 1600, Editorial Board of Journal on Communications (41): : 121 - 130
- [7] CluSID: a clustering scheme for intrusion detection, improved by information theory [J]. 2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 553 - 558
- [8] Application of intelligent information processing technologies to intrusion detection system [J]. General System and Control System, Vol I, 2007, : 274 - 277
- [9] Intrusion detection: Introduction to intrusion detection and security information management [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 207 - 236
- [10] An Intrusion Detection Feature Extraction Method Based on Information Theory Model [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2018, 47 (02): : 267 - 271