相似文献/References:
[1]何小娜 逄焕利.基于二维直方图和改进蚁群聚类的图像分割[J].计算机技术与发展,2010,(03):128.
HE Xiao-na,PANG Huan-li.Image Segmentation Based on Improved Ant Colony Clustering and Two- Dimensional Histogram[J].,2010,(01):128.
[2]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(01):143.
[3]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(01):151.
[4]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(01):148.
[5]冯春辉.Web日志挖掘在网络教学中的应用研究[J].计算机技术与发展,2010,(06):183.
FENG Chun-hui.Research on Application of Web Log Mining in Network Teaching[J].,2010,(01):183.
[6]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(01):254.
[7]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(01):162.
[8]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(01):170.
[9]李光耀 聂诗良.基于小波分解和模糊聚类的图像分割方法[J].计算机技术与发展,2009,(06):121.
LI Guang-yao,NIE Shi-liang.Image Segment Algorithm Based on Wavelet Decomposition and Fuzzy Clustering Theory[J].,2009,(01):121.
[10]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(01):168.
[11]种冬梅 李雷 朱志慧.基于改进的FCM算法的入侵检测研究[J].计算机技术与发展,2012,(10):191.
CHONG Dong-mei,LI Lei,ZHU Zhi-hui.Intrusion Detection Technology Research Based on Improved FCM Algorithm[J].,2012,(01):191.
[12]李锋. 粒子群模糊聚类算法在入侵检测中的研究[J].计算机技术与发展,2014,24(12):138.
LI Feng. Research on Fuzzy Clustering Algorithm Based on PSO in IDS[J].,2014,24(01):138.