参考文献/References:
[ 1] Va liant L G. A theory of learnable[ J]. Commun ica tion o f ACM, 1984, 27( 11): 1 134-1 142.
[ 2] Schapire R E. The strength of w eak learnab ility [ J]. M achine Learn ing, 1990, 5( 2) : 197-227.
[ 3] Zaknich A. In troduction to themod ified probab ilistic neural netwo rk for gene ra l s igna l pro cessing app lications[ J]. IEEE Transactions on S igna l Processing, 1998, 46( 7): 1 980-1 990.
[ 4] Freund Y, Schap ire R. Expe rim en ts w ith a new boosting algor ithm [ C ] / / Sa itta L. Proc o f the 13th Int. 1 Conf onM achine Learning. Austin: M organ Kanfm ann, 1996: 148-156.
[ 5] Liu B, H suW, M a Y. Prun ing and summ ar izing the d iscove red assoc ia tions[ Z] . KDD- 99, 1999.
[ 6] 刘道群. 基于遗传神经网络的入侵检测模型的研究[ D]. 重庆: 重庆大学, 2005.
Liu Daoqun. S tudy o f IDS model based on genetic neura l network[ D]. Chongq ing: Chongqing Un iversity, 2005. ( in Chinese)
[ 7] Jackson D A, Yong C. Robust pr inc ipal component analysis and outlier detection w ith eco log ical data[ J]. Env ironm etr ics,2004, 15( 2): 129-139.
相似文献/References:
[1]郑苗苗,吉根林.一种处理混合型属性的无监督异常入侵检测方法[J].南京师范大学学报(工程技术版),2008,08(02):068.
Zheng Miaomiao,Ji Genlin.An Unsupervised Anomaly Intrusion Detection for the Mixed Attributes[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):068.
[2]邱玉祥,杨明.一种基于混合差别矩阵的属性约简算法及其在入侵检测中的应用[J].南京师范大学学报(工程技术版),2008,08(03):071.
Qiu Yuxiang,Yang Ming.An Algorithm for Attribute Reduction in Rough Set and its Application in Intrusion Detection[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):071.
[3]褚红燕,沈世斌.基于概率模型算法的设备运行状态分析[J].南京师范大学学报(工程技术版),2005,05(04):034.
CHU Hongyan,SHEN Shibin.Analysis of Equipment Running Condition Based on the Probabilistic Model Arithmetic[J].Journal of Nanjing Normal University(Engineering and Technology),2005,05(04):034.