杨烨,李唐宁.信息安全"黑洞门"触目惊心[N].经济参考报,2015-03-04(001).
赵泽茂,吕秋云,朱芳.信息安全技术[M].西安:西安电子科技大学出版社,2009.
ANDERSON J P.Computer security threat monitoring and surveillance[R].[S.l.:s.n.],1980.
DENNING D E.An intrusion detection model[J].IEEE Transactions on Software Engineering,1987,13(2):222.
SMAHA S E.Haystack:an intrusion detection system [C]//Aerospace Computer Security Applications Conference.Piscataway:IEEE Conference Publications,1988:37.
LUNT T F,JAGANNATHAN R,LEE R,et al.Knowledge-based intrusion detection[C]//AI Systems in Government Conference.Piscataway:IEEE Conference Publications,1989:102.
HEBERLEIN L T,DIAS G V,LEVITT K N,et al.A network security monitor[J].IEEE Computer Society Symposium on Research in Security and Privacy,1990:296.
CHEN S S,CHEUNG S, CRAWFORD R H, et al. GrIDS-A Graph Based Intrusion Detection System for Large Networks[C]//Proceedings of the 19th National Information System Security Conference,[S.l.:s.n.],1996: 56.
SINCLAIR C,PIERCE L,MATZNER S.An application of machine learning to network intrusion detection[C]//Computer Security Applications Conference.Piscataway:IEEE Conference Publications,1999:371.
凌军,曹阳,尹建华,等.基于时态知识模型的网络入侵检测方法研究[J].计算机学报,2003,26(11):1591.
YU Z W,TSAI J J P,WEIGERT T.An automatically tuning intrusion detection system[J].IEEE Transactions on Systems,Man,and Cybernetics,Part B(Cybernetics),2007,37(2):373.
GHOSH A K,SCHWARTZBARD A,SCHATZ M.Learning program behaviour profiles for intrusion detection[C]// Conference on Workshop on Intrusion Detection and Network Monitoring[S.l.:s.n.],1999:51.
蒋亚平,赵军伟,冯柳,等.基于疫苗算子的入侵检测模型[J].计算机工程与设计,2014,35(7):2335.
ZHAO X F,JIANG H,JIAO L Y.A data fusion based intrusion detection model[C]//2009 First International Workshop on Education Technology and Computer Science.Piscataway:IEEE Conference Publications,2009:1017.
DESALE K S,KUMATHEKAR C N,CHAVAN A P.Efficient intrusion detection system using stream data mining classification technique[C]//International Conference on Computing Communication Control and Automation(ICCUBEA).Piscataway:IEEE Conference Publications,2015:469.
CHEN Y.Intelligent intrusion detection based on soft computing[C]//The 7th International Conference on Measuring Technology and Mechatronics Automation (ICM TMA).Piscataway:IEEE Conference Publications,2015:577.
HEDAR A R,OMER M A,Al-Sadek A F,et al.Hybrid evolutionary algorithms for data classification in intrusion detection systems[C]// ACIS 16th International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing (SNPD).Piscataway:IEEE Conference Publications,2015:1.
GONG W,FU W L,CAI L.A neural network based intrusion detection data fusion model[C]//Third International Joint Conference on Computational Science and Optimization (CSO).Piscataway:IEEE Conference Publications,2010:410.
CHEN M J,CHIEN K P,HUANG C Y,et al.An ASIC for SMTP intrusion prevention system[C]//IEEE International Symposium on Circuits and Systems.Piscataway:IEEE Conference Publications,2009:1847.
AL-HAMAMI A H,AL-SAADOON G M W.Development of a network-based:intrusion prevention system using a data mining approach[C]//Science and Information conference (SAI).Piscataway:IEEE Conference Publications,2013:641.
JIANG Y P,CHANG J L.Intrusion prevention system base on immune vaccination[C]//Second International Conference on Intelligent Computation Technology and Automation.Piscataway:IEEE Conference Publications,2009:350.
CHEN G L,YAO H,WANG Z B.An intelligent WLAN intrusion prevention system based on signature detection and plan recognition[C]//Second International Conference on Future Networks.Piscataway:IEEE Conference Publications,2010:168.
ALQAHTANI S M,BALUSHI M A,JOHN R.An intelligent intrusion prevention system for cloud computing (SIPSCC)[C]//2014 International Conference on Computational Science and Computational Intelligence (CSCI).Piscataway:IEEE Conference Publications,2014:152.
LI Song,ZOU Q,HUANG W.A new type of intrusion prevention system[C]//2014 International Conference on Information Science,Electronics and Electrical Engineering (ISEEE).Piscataway:IEEE Conference Publications,2014:361.
LI H,LIU D H.Research on intelligent intrusion prevention system based on snort[C]//International Conference on Computer,Mechatronics,Control and Electronic Engineering (CMCE).Piscataway:IEEE Conference Publications,2010:251.
唐正军,李建华.入侵检测技术[M].北京:清华大学出版社,2004.
靳蕃.神经计算智能基础[M].成都:西南交通大学出版社,2000.
吴峻,李洋.基于BP 神经网络和特征选择的入侵检测模型[J].计算机工程与应用,2008,44(30):114.
YANG Z M,WEI X M,BI L Y,et al.An intrusion detection system based on RBF neural network[C]//Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design.Piscataway:IEEE Conference Publications,2005:873.
时小虎,梁艳春,徐旭.改进的 Elman 模型与递归反传控制神经网络[J].软件学报,2003,14(6):1110.
杨宏宇,赵明瑞,谢丽霞.基于自适应进化神经网络算法的入侵检测[J].计算机工程与科学,2014,36(8):1469.
杨雅辉,黄海珍,沈晴霓,等.基于增量式GHSOM神经网络模型的入侵检测研究[J].计算机学报,2014,37(5):1216.
田俊峰,赵卫东,杜瑞忠,等.新的入侵检测数据融合模型——IDSFP[J].通信学报,2006,27(6):115.
FESSI B A,ABDALLAH S B,DJEMAIEL Y,et al.A clustering data fusion method for intrusion detection system[C]//IEEE 11th International Conference on Computer and Information Technology (CIT).Piscataway:IEEE Conference Publications,2011:539.
PUGH M.A minimax approach to sensor fusion for intrusion detection[C]//IEEE on Sensors Applications Symposium (SAS).Piscataway:IEEE Conference Publications,2015:1.
梁可心,李涛,刘勇,等.一种基于人工免疫理论的新型入侵检测模型[J].计算机工程与应用,2005(2):129.
ZHAO J H,LIU N.A dynamic intrusion detection model based on immunity for wireless sensor network[C]//The Third International Workshop on Intelligent Systems and Applications (ISA).Piscataway:IEEE Conference Publications,2011:1.
张玲,白中英,谢康.动态疫苗接种的入侵检测侧方法[J].北京邮电大学学报,2014,37(Z):77.
刘海龙,张凤斌,席亮.基于协同进化的免疫检测器分布优化算法[J].计算机工程,2013,39(11):154.
冯翔,马美怡,赵天玲,等.基于复合免疫算法的入侵检测系统[J].计算机科学,2014,41(12):43.
丁菊玲,刘晓洁,李涛,等.基于人工免疫的网络入侵动态取证[J].四川大学学报(工程科学版),2004,36(5):108.
WANG H R,WANG H.Research and design of multi-agent based intrusion detection system on wireless network[C]//International Symposium on Computational Intelligence and Design.Piscataway:IEEE Conference Publications,2008:444.
KUMAR G V P,REDDY D K.An agent based intrusion detection system for wireless network with artificial immune system (AIS) and negative clone selection [C]//International Conference on Electronic Systems,Signal Processing and Computing Technologies (ICESC).Piscataway:IEEE Conference Publications,2014:429.