共 50 条
- [41] DAREnsemble: Decision Tree and Rule Learner Based Ensemble for Network Intrusion Detection System [J]. PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 185 - 193
- [42] Parametric observation rule-based intrusion detection strategy for in-vehicle network [J]. 2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 2676 - 2681
- [43] Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework [J]. COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 59 - 75
- [44] Detecting and resolving conflict for network intrusion rule [J]. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2006, 36 (04): : 522 - 525
- [45] Mining network data for intrusion detection through combining SVMs with ant colony networks [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 : 127 - 140
- [46] Wireless Intrusion Detection: Not as easy as traditional network intrusion detection [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2513 - +
- [47] L-KPCA: an efficient feature extraction method for network intrusion detection [J]. 2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 683 - 684
- [48] Kernel PCA based network intrusion feature extraction and detection using SVM [J]. ADVANCES IN NATURAL COMPUTATION, PT 2, PROCEEDINGS, 2005, 3611 : 89 - 94
- [49] A Novel Feature Extraction Method Assembled with PCA and ICA for Network Intrusion Detection [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 31 - 34
- [50] Network anomaly intrusion detection CVM model based on PLS feature extraction [J]. Kongzhi yu Juece/Control and Decision, 2017, 32 (04): : 755 - 758