李洋, 吕家恪.基于Hadoop与Storm的日志实时处理系统研究[J].西南师范大学学报(自然科学版), 2017, 42(4):119-126.
|
曾强, 缪力, 秦拯.面向大数据处理的Hadoop与MongoDB整合技术研究[J].计算机应用与软件, 2016, 33(2):21-24, 37. doi: 10.3969/j.issn.1000-386x.2016.02.005
|
ASHFAQ R A R, WANG X Z, HUANG J Z, et al.Fuzziness Based Semi-Supervised Learning Approach for Intrusion Detection System[J]. Information Sciences, 2017, 378:484-497. doi: 10.1016/j.ins.2016.04.019
|
张礼哲, 顾兆军, 何波, 等.多源攻击模式图入侵检测方法[J].计算机工程与设计, 2016, 37(11):2909-2916.
|
陈虹, 万广雪, 肖振久.基于优化数据处理的深度信念网络模型的入侵检测方法[J].计算机应用, 2017, 37(6):1636-1643, 1656. doi: 10.3969/j.issn.1001-3695.2017.06.008
|
LAI S F, SU H K, HSIAO W H, et al.Design and Implementation of Cloud Security Defense System with Software Defined Networking Technologies[C]//2016 International Conference on Information and Communication Technology Convergence (ICTC).Jeju: IEEE, 2016.
|
DAWLE Y, NAIK M, VANDE S, et al.Database Security Using Intrusion Detection System[J]. Database, 2017, 2(3):1-6.
|
SURYAWANSHI S S, MULANI T, ZANJURNE S, et al.Database Intrusion Detection and Protection System Using Log Mining and Forensic Analysis[J]. IntJComput SciInfTechnol, 2015, 6:5059-5061.
|
BUCZAK A L, GUVEN E.A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection[J]. IEEE Communications Surveys & Tutorials, 2016, 18(2):1153-1176.
|
RAO U P, SINGH N K.Weighted Role Based Data Dependency Approach for Intrusion Detection in Database[J]. IJ Network Security, 2017, 19(3):358-370.
|
ELAZIZ P E A, MOHAMED H K.Database Intrusion Detection Using Sequential Data Mining Approaches[C]//20149th International Conference on Computer Engineering & Systems (ICCES).Cairo: IEEE, 2014.
|
WANG N, LI Y, YUAN L M.Simulation on Optimized Intrusion Detection of Multi-Layer, Distributed and Large Differences Database[J]. Applied Mechanics and Materials, 2014, 556-562:2886-2889. doi: 10.4028/www.scientific.net/AMM.556-562
|
YI M.On the Research of Force into Computer Database Intrusion Detection Technology[J]. R Risti Iberian Journal on Information Systems & Technologies, 2016, 18:80-89.
|
PANIGRAHI S, SURAL S, MAJUMDAR A K.Two-Stage Database Intrusion Detection by Combining Multiple Evidence and Belief Update[J]. Information Systems Frontiers, 2013, 15(1):35-53.
|