Author:
Hong Daocheng,Zhao Deshan,Zhang Yanchun
Reference28 articles.
1. Hawkins D. M. Identification of outliers. Chapman and Hall, London, 1980.
2. Rawat S., A.K. Pujari, and V. P. Gulati. On the use of singular value decomposition for a fast intrusion detection system, Electronic Notes in Theoretical Computer Science, 2006, 142. 215-228.
3. Huang L., X. Nguyen, M. Garofalakis, M.I. Jordan, A. Joseph, and N. Taft. In-network PCA and anomaly detection, Advances in Neural Information Processing Systems, 2007, 19. 617.
4. Lazarevic A., L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava. A comparative study of anomaly detection schemes in network intrusion detection, Proc. SIAM. 2003.
5. Wang W., X. Guan, and X. Zhang. A novel intrusion detection method based on principle component analysis in computer security, in Advances in Neural Networks, 2004, 657-662.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献