共 11 条
- [1] Deshpande P., Sharma S.C., Et al., HIDS: A host based intrusion detection system for cloud computing environment, International Journal of System Assurance Engineering and Management, 9, 3, pp. 567-576, (2018)
- [2] Gao N., Gao L., He Y.Y., Wang H., A lightweight intrusion detection model based on autoencoder network with feature reduction, Acta Electronica Sinica, 45, 3, pp. 730-739, (2017)
- [3] Chawla A., Lee B., Fallon S., Et al., Host based intrusion detection system with combined cnn/rnn model, Proceedings of Second International Workshop on AI in Security, pp. 149-158, (2018)
- [4] Wagh S., Neelwarna G., Kolhe S., Multi-disciplinary Trends in Artificial Intelligence, pp. 143-154, (2012)
- [5] Jain P., Kulis B., Dhillon I.S., Grauman K., Online metric learning and fast similarity search, Proceedings of the 21st International Conference on Neural Information Processing Systems NIPS'08, pp. 761-768, (2008)
- [6] Friedman J.H., Bentley J.L., Finkel R.A., An algorithm for finding best matches in logarithmic expected time, ACM Trans Math Softw, 3, 3, pp. 209-226, (1977)
- [7] Liu T., Moore A.W., Gray A., Efficient exact K-NN and nonparametric classification in high dimensions, Proceedings of the 16th International Conference on Neural Information Processing Systems, pp. 265-272, (2003)
- [8] Stolfo S.J., Fan W., Lee W.K., Et al., Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project
- [9] Johnstone I.M., Lu A.Y., Sparse principal components analysis
- [10] Niu X.M., Jiao Y.H., An overview of perception Hashing, Acta Electronica Sinica, 36, 7, pp. 1405-1411, (2008)