1Tyugu E. Artificial intelligence in cyber defense[ C ]//Proc of the 3rd International Conference on Cyber Conflict. 2011 : 1-11. 被引量:1
2Poell R A, Szklrz P C. R3-getting the right information to the right people, right in time[ C]//Proc of Concepts and Implementations for Innovative Military Communications and Information Technologies. Warsaw : Military Universitv of Technology Publisher. 2010:23-31. 被引量:1
7SSBass T, Gruber D. A glimpse into the future of ID [ EB/OL]. (2001- 02- 01 ). http ://www. thecepblog, com/papers/pdf/useNixglimpse.pdf. 被引量:1
8BarikA F, Hadjar K, E1 Kadhi N. Artificial neural network for mo- bile IDS solution [ C ]//Proc of Security and Management Conference. 2009:271-277. 被引量:1
9Stopel D, Boger Z, Moskovitch R, et al. Application of artificial nan- ral networks techniques to computer worm detection [ C ]//Proc of In- ternational Joint Conference on Neural Networks. 2006:2362-2369. 被引量:1
10Vaitsekhovich G L. Neural network techniques for intrusion detection [ C ]//Proc of International Conference on Neural Networks and Arti- ficial Intelligence. 2006:65-69. 被引量:1