相似文献/References:
[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(09):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(09):151.
[3]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(09):148.
[4]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(09):254.
[5]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(09):162.
[6]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(09):170.
[7]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(09):168.
[8]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(09):179.
[9]汪世义.基于优化支持向量机的网络入侵检测技术研究[J].计算机技术与发展,2009,(07):177.
WANG Shi-yi.Network Intrusion Detection Based on Improved Support Vector Machine[J].,2009,(09):177.
[10]薛俊 陈行 陶军.一种基于神经网络的入侵检测技术[J].计算机技术与发展,2009,(08):148.
XUE Jun,CHEN Hang,TAO Jun.Technology of Intrusion Detection Based on Neural Network[J].,2009,(09):148.
[11]徐长棣 刘方爱.基于P2P和移动代理的入侵检测系统研究[J].计算机技术与发展,2007,(01):164.
XU Chang-di,LIU Fang-ai.Research of Intrusion Detection System Based on P2P and Mobile Agents[J].,2007,(09):164.
[12]何向荣 沈佐民 吴璞 王汝传.移动代理入侵检测系统中的自适应技术的研究[J].计算机技术与发展,2006,(02):229.
HE Xiang-rong,SHEN Zuo-min,WU Pu,et al.Research on Adaptive Technique of Intrusion Detection and System Based on Mobile Agent[J].,2006,(09):229.
[13]李守国 李俊.基于数据挖掘的入侵检测系统设计[J].计算机技术与发展,2006,(04):212.
LI Shou-guo,LI Jun.Design of Data Mining Based Intrusion Detection System[J].,2006,(09):212.
[14]刘冰寒 张建 刘宝代.具有协作代理功能的分布式入侵检测系统[J].计算机技术与发展,2010,(09):149.
LIU Bing-han,ZHANG Jian,LIU Bao-dai.Distributed Intrusion Detection System with Collaborative Agent Functions[J].,2010,(09):149.