[1]
Wang Yan, Xiao Wei-min, in: Research on the Application of Data Mining Technique in Intrusion Detection System, edited by Anhui University(2010).
Google Scholar
[2]
Verwoerd T, Hunt R: Intrusion detection techniques and approaches, Computer Communications, Vol. 25(15), pp.1356-1365(2002).
DOI: 10.1016/s0140-3664(02)00037-3
Google Scholar
[3]
Yu Kun, in: Designs and Implementation of Abnormal Intrusion Detection Based on the High Frequency Statistics, edited by Beijing University of Posts and Telecommunications(2006).
Google Scholar
[4]
Cai Jian, in: The Research and Implementation of Intrusion Detection System Based on Artificial Neural Network, edited by Guizhou University(2005).
Google Scholar
[5]
Wu Tao, Wang Xin-fang, in: Research of Intrusion Detection Techniques Based on Data Mining , edited by Xi'an University of Technology(2010).
Google Scholar
[6]
Chen Yu-hui, Fu Ming, in: Study on Intrusion Detection Technology Base on Data Mining, edited by ChangshaUniversity of Technology(2010).
Google Scholar
[7]
LI Yang: K-meansApplication of K-means Clustering Algorithm in Intrusion Detection, Computer Engineering, Vol. 33(14), pp.154-156(2007).
Google Scholar
[8]
ZHANG Jian-ping: Application in Cluster's Analysis Is Analyzed in Children Development Period, Application Research of Computers, Vol. 24(5), pp.166-168, (2007).
Google Scholar
[9]
Chinrungrueng. C, Sequin, C. H: Optimal adaptive k-means algorithm with dynamic adjustment of learning rate, Columbia University ( 2002).
DOI: 10.1109/ijcnn.1991.155291
Google Scholar
[10]
Yan Xiao-guang: Application to Cluster Algorithm in Anomaly Detection of Network Intrusion , Applications of The Computer Systems, Vol. 10(2005), pp.34-37.
Google Scholar
[11]
MA Xiao-chun, GAO Xiang, GAO De-yuan: The Application of Cluster Analysis to Intrusion Detection System , Microelectronics & Computer, Vol. 22(4), pp.134-136 , (2005).
Google Scholar
[12]
Dj.M. Maric, P.F. Meier and S.K. Estreicher: Mater. Sci. Forum Vol. 83-87 (1992), p.119.
Google Scholar