Optimization of Dynamic Programming to the Multimedia Packets Processing Method for Network Intrusion Detection System
暂无分享,去创建一个
[1] Liang He,et al. An Improved Intrusion Detection based on Neural Network and Fuzzy Algorithm , 2014, J. Networks.
[2] Liang Hu,et al. Intrusion Classifier based on Multiple Attribute Selection Algorithms , 2013, J. Comput..
[3] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[4] M. Arun,et al. Functional verification of signature detection architectures for high speed network applications , 2012, Int. J. Autom. Comput..
[5] K. Sravani,et al. Comparative Study of Machine Learning Algorithm for Intrusion Detection System , 2013, FICTA.
[6] Liu Ming-zhe. Network Intrusion Detection Based on CPSO-LSSVM , 2013 .
[7] Wang Yongsheng,et al. Intrusion detection algorithm based on fuzzy evaluation and clustering analysis , 2012 .
[8] Yan Hongwen. Research on improved BMH single-pattern matching algorithm based on Snort , 2012 .
[9] Bo Liu,et al. Intrusion Detection Scheme based on IPSO-RBF , 2013, J. Networks.
[10] Jiang She. An Improved Ant Colony Clustering Method for Intrusion Detection , 2013 .
[11] Khalid Shahbar,et al. (WHASG) Automatic SNORT Signatures Generation by using Honeypot , 2013, J. Comput..
[12] Jian Dai,et al. The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection , 2014, J. Networks.
[13] Liu Yu. Intrusion detection model of abnormal event fusion based on gray correlation , 2013 .
[14] Qingtao Wu,et al. Intrusion Feature Selection Algorithm Based on Particle Swarm Optimization , 2014 .
[15] Song Tian,et al. Memory Efficient Algorithm and Architecture for Multi-Pattern Matching , 2013 .