共 50 条
- [1] Application of Support Vector Clustering algorithm to network intrusion detection [J]. PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS AND BRAIN, VOLS 1-3, 2005, : 1036 - 1040
- [2] Application of weighted support vector machines to network intrusion detection [J]. SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1025 - 1029
- [3] Application of Support Vector Machine and Genetic Algorithm to Network Intrusion Detection [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2267 - 2269
- [4] A wavelet transform based support vector machine ensemble algorithm and its application in network intrusion detection [J]. 2014 FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS (ISDEA), 2014, : 109 - 113
- [5] A Wavelet Transform Based Support Vector Machine Ensemble Algorithm and Its Application in Network Intrusion Detection [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 307 - 316
- [6] Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm [J]. Wireless Personal Communications, 2022, 127 : 599 - 613
- [8] An Intrusion Detection Algorithm Model Based on Extension Clustering Support Vector Machine [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 15 - 18
- [9] Improved fuzzy clustering algorithm and its application to intrusion detection [J]. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2007, 37 (04): : 589 - 592
- [10] A novel clustering algorithm based on weighted support and its application [J]. 2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 95 - 100