1SRINIVAS MUKKAMALA,ANDREWH SUNG.Identifying Significant Features for Network Forensic Analysis Using Artificial Intel-ligent Techniques[J].International Journal of Digital Evidence,2003,(4):63-69.
1Andrew H S. Identify important features for intrusion detection using support vector machines and neural networks[A]. Proceedings of the 2003 International Symposium on Applications and the Internet Technology[C]. New Jersey:IEEE Computer Society Press, 2003. 209-216.
2Mukkamala S, Janoski G, Sung A. Intrusion detection using neural networks and support vector machines[A]. Proceedings of the International Joint Conference on Neural Networks[C]. New Jersey: IEEE Computer Society Press, 2002.1 702-1 707.
3Martin B, Rossouw V S. Utilizing fuzzy logic and trend analysis for effective intrusion detection[J]. Computers and Security, 2003,22(5):423-434.
4Wang Yong, Yang Huihua, Wang Xingyu, et al. Distributed intrusion detection system based on data fusion method [A]. 5th World Congress on Intelligent Control and Automation[C]. New Jersey:IEEE Press, 2004.250-252.
5Matthew V M, Philips K C. An analysis of the 1999 DARPA/Lincoln laboratories evaluation data for network anomaly detection[DB/OL]. http://www, cs.fit.edu/~mmahoney/,2003.