[1] 康松林, 刘乐, 刘楚楚, 等. 多层极限学习机在入侵检测中的应用[J]. 计算机应用, 2015, 35(9): 2513-2518. Kang Songlin, Liu Le, Liu Chuchu, et al.Intrusion Detection Based on Multiple Layer Extreme Learning Machine[J]. Journal of Computer Application, 2015, 35(9): 2513-2518. [2] Akashdeep, Manzoor I, Kumar N. A Feature Reduced Intrusion Detection System Using ANN Classifier[J]. Expert Systems With Applications (S0957-4174), 2017, 88(12): 249-257. [3] 姚潍, 王娟, 张胜利. 基于决策树与朴素贝叶斯分类的入侵检测模型[J]. 计算机应用, 2015, 35(10): 2883-2885. Yao Wei, Wang Juan, Zhang Shengli.Intrusion Detection Model Based on Decision Tree and Naive-Bayes Classification[J]. Journal of Computer Application, 2015, 35(10): 2883-2885. [4] Chitrakar R, Huang C H.Selection of Candidate Support Vectors in Incremental SVM for Network Intrusion Detection[J]. Computers and Security (S0167-4048), 2014, 45(3): 231-241. [5] Gu J, Wang L H, Wang H W, et al.A Novel Approach to Intrusion Detection Using SVM Ensemble with Feature Augmentation[J]. Computers and Security (S0167-4048), 2019, 86(9): 53-62. [6] 沈夏炯, 王龙, 韩道军. 人工蜂群优化的BP神经网络在入侵检测中的应用[J]. 计算机工程, 2016, 42(2): 190-194. Shen Xiajiong, Wang Long, Han Daojun.Application of BP Neural Network Optimized by Artificial Bee Colony in Intrusion Detection[J]. Journal of Computer Engineering, 2016, 42(2): 190-194. [7] 丁红卫, 万良, 邓烜堃. 改进的HS算法优化BP神经网络的入侵检测研究[J]. 计算机工程与科学, 2019, 41(1): 65-72. Ding Hongwei, Wan Liang, Deng Xuankun.Optimizing Intrusion Detection of A Modified Harmony Search Algorithm[J]. Journal of Computer Engineering and Science, 2019, 41(1): 65-72. [8] Zhu Y Z.Intrusion Detection Method Based on Improved BP Neural Network Research[J]. International Journal of Security and Its Applications (S1738-9976), 2016, 10(5): 193-202. [9] Fung C J, Zhang J, Boutaba R.Effective Acquaintance Management Based on Bayesian Learning for Distributed Intrusion Detection Networks[J]. IEEE Transactions on Network and Service Management (S1932-4537), 2012, 9(3): 320-332. [10] 马超. 基于ReliefF和改进乌鸦搜索优化的并行入侵检测方法[J]. 计算机应用研究, 2019, 36(10): 3063-3068. Ma Chao.Network Intrusion Based on ReliefF and Improved Crow Search Optimization Parallel Method[J]. Journal of Application Research of Computers, 2019, 36(10): 3063-3068. [11] Huang G B, Zhu Q Y, Siew C K.Extreme learning machine: Theory and application[J]. Neurocomputing (S0925-2312), 2006, 70(1/3): 489-501. [12] 黄思慧, 陈万忠, 李晶. 基于PCA和ELM的网络入侵检测技术[J]. 吉林大学学报(信息科学版),2017, 35(5): 576-583. Huang Sihui, Chen Wanzhong, Li Jing.Network Intrusion Detection Based on Extreme Learning Machine and Principal Component Analysis[J]. Journal of Jilin University (Information Science Edition), 2017, 35(5): 576-583. [13] 王琳琳, 刘敬浩, 付晓梅. 基于极限学习机与改进K-means算法的入侵检测方法[J]. 计算机工程与科学, 2018, 40(8): 1398-1404. Wang Linlin, Liu Jinghao, Fu Xiaomei.An Intrusion Detection Method Based on Extreme Learning Machine and Modified K-means[J]. Journal of Computer Engineering and Science, 2018, 40(8): 1398-1404. [14] Al-Yaseen W L, Othman Z A, Nazri M Z A. Multi-level Hybrid Support Vector Machine and Extreme Learning Machine Based on Modified K-means for Intrusion Detection System[J]. Expert Systems with Applications (S0957-4174), 2017, 67(1): 296-303. [15] Zong W W, Huang G B, Chen Y Q.Weighted Extreme Learning Machine for Imbalance Learning[J]. Neurocomputing (S0925-2312), 2013, 101(3): 229-242. [16] Pan W T.A New Fruit Fly Optimization Algorithm: Taking the Financial Distress Model as An Example[J]. Knowledge-based System (S0950-7051), 2012, 26(2): 69-74. [17] Lv S X, Zeng Y R, Wang L.An Effctive Fruit Fly Optimization Algotithm with Hybrid Information Exchange and Its Applications[J]. International Journal of Machine Learning and Cybernetics (S1868-8071), 2018, 9(10): 1623-1648. [18] Hu R, Wen S, Zeng Z.A Short-term Power Load Forecasting Model Based on the Generalized Regression Neural Network With Decreasing Step Fruit Fly Optimization Algorithm[J]. Neuroconputing (S0925-2312), 2017, 221(1): 24-31. [19] 李少波, 赵辉, 赵成龙, 等. 果蝇优化算法研究综述[J]. 科学技术与工程, 2018, 18(1): 163-171. Li Shaobo, Zhao Hui, Zhao Chenglong, et al.Review of Fruit Fly Optimization Algorithms[J]. Journal of Science Technology and Engineering, 2018, 18(1): 163-171. [20] Shan D, Cao G H, Dong H J.LGMS-FOA: An Improved Fruit Fly Optimization Algorithm for Solving Optimization Problems[J]. Mathematical Problems in Engineering (S1563-5147), 2013(7): 1256-1271. [21] Dhanabal L, Shantharajah S P.A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms[J]. International Journal of Advanced Research in Computer and Communication Engineering (S2319-5940), 2015, 4(6): 446-452. |