期刊文献+

与时俱进论特区——“加入世贸组织后中国经济特区的走向问题”会议综述

Points from a Forum on the Orientation for Economic Special Regions' Development After China's Entering WTO
下载PDF
导出
作者 韦前
出处 《学术研究》 CSSCI 北大核心 2002年第5期132-133,共2页 Academic Research
  • 相关文献

参考文献11

二级参考文献57

  • 1撖书良,蒋嶷川,张世永.基于神经网络的高效智能入侵检测系统[J].计算机工程,2004,30(10):69-70. 被引量:11
  • 2胡守仁.神经网络导论[M].北京:国防科大出版社,1995.113.
  • 3[1]Wenke L, Salvatore S . Data Mining Approaches for lnrusion Detection. URL: http://www.cs.columbiaedu/~wenke/papers/usenix/ usenix.html, 2000-10-12
  • 4[2]Network Flight Recorder Inc.Network Flight Recorder http://www.nfr com
  • 5[3]Fayyad U , Piatetsky-Shapiro G , Smyth P . From Data Mining to Knowledge Discovery: An Overview. In Fayyad U . PiatetskyShapiro G , Smyth P, and Uthurusamy R, Editors, Adyances in Knowledge Discovery and Data Mining , AAAI/MIT Press,Cambridge, MA, 1996
  • 6[4]Lunt T. Detecting Intruders in Computer Systems. Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993
  • 7Vern Paxson. Bro:A System for Detecting Network Intruders in Real-time[J].Computer Networks, 1999,31(23-24):2435-2463.
  • 8Salvatore Stolfo,et al. KDD- CUP-99 Task Description [EB/OL].http: // kdd.ics. uci.edu/databases/kddcup99/task.html.
  • 9RebeccaGurleyBace著 陈明奇 吴秋新 杨晓兵译.入侵检测[M].北京:人民邮电出版社,2001..
  • 10Denning DE.An Intrusion Detection Model[C].IEEE Transaction on Software Engineering,1986.

共引文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部