共 50 条
- [41] Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm [J]. Wireless Personal Communications, 2022, 127 : 599 - 613
- [43] Anomaly detection based on unsupervised niche clustering with application to network intrusion detection [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 502 - 508
- [44] A supervised clustering algorithm for computer intrusion detection [J]. Knowledge and Information Systems, 2005, 8 : 498 - 509
- [45] Application of improved Clustering Algorithm in Intrusion Detection [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 621 - 624
- [47] A neighbor propagation clustering algorithm for intrusion detection [J]. Li, Zheng (lizh_1981@163.com), 1600, International Information and Engineering Technology Association (34): : 331 - 336
- [48] Fuzzy clustering method based on genetic algorithm in intrusion detection study [J]. Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 140 - 145
- [49] A novel intrusion detection method based on clonal selection clustering algorithm [J]. PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3905 - 3910