1C. Kruegel, F. Valeur, G. Vigna, Intrusion Detection and Correlation Challenges and Solutions, Springer Science, Boston, 2005. 被引量:1
2J. Zhang, M. Zulkernine, Random-forests-based network intrusion detection systems, IEEE Transactions on Systems Man and Cybernetics 38 1,2008) 649-659. 被引量:1
3H.A. Nguyen, D. Choi, Application of Data Mining to Network Intrusion Detection: Classifier Selection Model, In Challenges for Next Generation Network Operations and Service Management, Springer Berlin, Heidelberg, 2008. 被引量:1
4D.M. Farid, N. Harbi, M.Z bayes and decision tree for International Journal of Rahman, Combining naive adaptive intrusion detection, Network Security & ItsApplications (IJNSA) 2 (2010) 12-25. 被引量:1
5NSL-KDD Dataset for Network-based Intrusion Detection Systems, http://nsl.cs.unb.ca/NSL-KDD/(accessed March 2009). 被引量:1
6S. Lakhina, S. Joseph, B. Verma, Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD, International Journal of Engineering Science and Technology 2 (2010) 1790-1799. 被引量:1
7M. Tavallaee, E. Bagheri, W. Lu, A.A. Ghorbani, A detailed analysis of the KDD CUP 99 dataset, in: Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications, Canada, 2009. 被引量:1
8M.W. Berry, M. Browne, Lecture Notes in Data Mining, World Scientific Publishing Co. Pte. Ltd, 2006. 被引量:1
9J.W. Han, M, Kamber, Data Mining Concepts and Techniques, Morgan Kaufmann Publishers, Elsevier Inc, 2006. 被引量:1
10N. Gayatri, S. Nickolas, A.V. Reddy, Feature selection using decision tree induction in class level metrics dataset for software defect predictions, in: Proceedings of the World Congress on Engineering and Computer Science 2010, San Francisco, USA, 2010. 被引量:1