已阅论文

[1] Shelly Xiaonan Wu, Wolfgang Banzhaf. The use of computational intelligence in intrusion detection systems: A review.  Applied Soft Computing, 2010, 10 : 1�C35.
[2] P. Garcı´a-Teodoro, J. Dı´az-Verdejo, G. Macia´-Ferna´ndez, E. Va´zquez. Anomaly-based network intrusion detection:Techniques, systems and challenges. Computers & Security, 2009, 28: 18 �C28.
[3] Chih-Fong Tsai, Yu-Feng Hsu, Chia-Ying Lin, Wei-Yang Lin. Intrusion detection by machine learning: A review. Expert Systems with Applications, 2009, 36: 11994�C12000.
[4] Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson Thomasa. Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications, 2007, 30: 114�C132.
[5] Han-Ching Wu, Shou-Hsuan Stephen Huang. Neural networks-based detection of stepping-stone intrusion. Expert Systems with Applications, 2010, 37: 1431�C1437.
[6] 李晓芳 , 姚远 . 入侵检测工具 Snort 的研究与使用 . 计算机应用与软件 , 2006, 23(3): 123�C125.

你可能感兴趣的:(职场,论文,休闲)