2018 Vol.1 Dec. No.6 |
---|
|
Reference: [1] D. Subhadrabandhu, F. Anjum, and S. Sarkar. On optimal placement of intrusion detection modules in sensor networks[C]. Proceedings of the First International Conference on Broadband Networks, 2004: 690-699. [2] Anjum F, Subhadrabandhu D, Sarkar S, et al. On Optimal Placement of Intrusion Detection Modules in Sensor Networks[C]. 1st International Conference on Broadband Networks. Washington: IEEE Press, 2004: 433–439. [3] O.Chapelle,V. Vapnik. Choosing multiple parameters for support vector machines. [J] Machine Learning,2002,46:131-159. [4] Zhang Haichun, Li Yuan, Zhang Zili. Design and Simulation of the System for Intelligent Intrusion Detection [J]. Mathematics in practice and theory,2009,39(6):162-169. [5] Wang Zhongcai, Li Yongbi. Intrusion Detection System Based on Data Mining Research [J]. Bulletin of Science and Technology, 2012, 28(8): 150-152. [6] Dai Tianhong, Wang Keqi, Yang Shaochun. Intrusion Detection Research Based on Support Vector Machine [J]. China safety science journal, 2008, 18(4):126-130. |
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16