共 50 条
- [1] Intrusion Detection Method Based on Classify Support Vector Machine [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 391 - 394
- [2] Application of Support Vector Machine and Genetic Algorithm to Network Intrusion Detection [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2267 - 2269
- [3] DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 286 - 297
- [4] Network Intrusion Detection Algorithm based on Improved Support Vector Machine [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 523 - 526
- [5] Research on Intrusion Detection System Based on Clustering Fuzzy Support Vector Machine [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 249 - 260
- [6] Network Intrusion Detection Method of Support Vector Machine Based On QPSO [J]. ICAIE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND EDUCATION, VOLS 1 AND 2, 2009, : 283 - 287
- [7] CFAR intrusion detection method based on support vector machine prediction [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MEASUREMENT SYSTEMS AND APPLICATIONS, 2004, : 10 - 15
- [8] Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm [J]. Wireless Personal Communications, 2022, 127 : 599 - 613
- [10] An Intrusion Detection Algorithm Model Based on Extension Clustering Support Vector Machine [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 15 - 18