共 50 条
- [1] Intrusion detection method based on support vector machine and information gain for mobile cloud computing [J]. Zhang, Qiu-Yu (zhangqylz@163.com), 1600, Femto Technique Co., Ltd. (22): : 231 - 241
- [2] Intrusion Detection Method Based on Classify Support Vector Machine [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 391 - 394
- [3] Network Intrusion Detection Method of Support Vector Machine Based On QPSO [J]. ICAIE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND EDUCATION, VOLS 1 AND 2, 2009, : 283 - 287
- [4] CFAR intrusion detection method based on support vector machine prediction [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MEASUREMENT SYSTEMS AND APPLICATIONS, 2004, : 10 - 15
- [5] The research of Intrusion Detection based on Support Vector Machine [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 21 - 23
- [6] Research of Intrusion Detection Based on Support Vector Machine [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 434 - 438
- [7] An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (24):
- [8] Search on Method of Netwok Intrusion Detection Based on Support Vector Machine with Pre-extracting Support Vector [J]. ENGINEERING SOLUTIONS FOR MANUFACTURING PROCESSES, PTS 1-3, 2013, 655-657 : 1787 - +
- [9] Intrusion detection method based on support vector machine access of Modbus TCP protocol [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 380 - 383
- [10] Intrusion Detection Model based on Improved Support Vector Machine [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 465 - 469