[1] |
毕猛, 王安迪, 徐剑 , 等. 基于离散马尔科夫链的数据库用户异常行为检测[J].沈阳工业大学学报,2018(1):70-76.
|
|
Bi Meng, Wang Andi, Xu Jian , et al. Anomaly behavior detection of database user based on discrete-time Markov chain[J].Journal of Shenyang University of Technology, 2018(1):70-76.
|
[2] |
张冰冰 . 用于感知局域网攻击的离散事件系统研究[J]. 电子科技, 2017,30(9):169-172.
|
|
Zhang Bingbing . Research on discrete event system for LAN attack[J]. Electronic Science and Technology, 2017,30(9):169-172.
|
[3] |
茹蓓, 贺新征 . 云计算环境下入侵疑似边界问题改进算法[J].沈阳工业大学学报,2017(5):545-550.
|
|
Ru Bei, He Xinzheng . Improved algorithm for intrusion suspected boundary problem in cloud computing environment[J].Journal of Shenyang University of Technology, 2017(5):545-550.
|
[4] |
刘海燕, 张钰, 毕建权 , 等. 基于分布式及协同式网络入侵检测技术综述[J].计算机工程与应用,2018(8):1-6,20.
|
|
Liu Haiyan, Zhang Yue, Bi Jianquan , Overview of distributed and cooperative network intrusion detection technologies[J]. Computer Engineering and Applications, 2018 (8):1-6,20.
|
[5] |
林伟宁, 陈明志, 詹云清 , 等. 一种基于PCA和随机森林分类的入侵检测算法研究[J].信息网络安全,2017(11):54-58.
|
|
Lin Weining, Chen Mingzhi, Zhan Yunqing , et al. Research on intrusion detection algorithms based on PCA and random forest classification[J]. Information Network Security, 2017 (11):54-58.
|
[6] |
孙蔚 . 基于网管系统的分布式入侵检测模型研究[J]. 电子设计工程, 2014,22(1):165-167.
|
|
Sun Wei . Research of distributed intrusion detection based on network management system[J]. Electronic Design Engineering, 2014,22(1):165-167.
|
[7] |
王小龙 . 基于Snort的网络入侵检测系统的设计与实现[D]. 西安:beoplay体育提现, 2017.
|
|
Wang Xiaolong . Design and implementation of network intrusion detection system based on Snort[D]. Xi’an:Xidian University, 2017.
|
[8] |
王鲁华 . 基于数据挖掘的网络入侵检测方法[J]. 信息安全研究, 2017,3(9):810-816.
|
|
Wang Luhua . Network intrusion detection method based on data mining[J]. Information Security Research, 2017,3(9):810-816.
|