参考文献/References:
[1]WU J X,LI J H,JI X S. Security for cyberspace:Challenges and opportunities[J]. Frontiers of information technology & electronic engineering,2018,19(12):1459-1461.
[2]中国信息通信研究院安全研究所. 2020年网络安全威胁信息研究报告[EB/OL]. [2021-12-03]. http://www.caict.ac.cn/kxyj/qwfb/ztbg/202112/P020211203576374176759.pdf.
[3]MOHAMED M B,MEDDEB-MAKHLOUF A,FAKHFAKH A. Intrusion cancellation for anomaly detection in healthcare applications[C]//International Wireless Communications & Mobile Computing Conference(IWCMC). Split Croatia:IEEE,2019:313-318.
[4]GHOSH K,NEOGY S,DAS P K,et al. Intrusion detection at international borders and large military barracks with multi-sink wireless sensor networks:An energy efficient solution[J]. Wireless pearsonal communications,2018,98(1):1083-1101.
[5]GAO L L,LI F,XU X,et al. Intrusion detection system using SOEKS and deep learning for in-vehicle security[J]. Cluster computing,2019,22(S6):14721-14729.
[6]HU Y,YANG A,LI H,et al. A survey of intrusion detection on industrial control systems[J]. International journal of distributed sensor networks,2018,14(8):155014771879461.
[7]HALDER S,GHOSAL A,CONTI M. Efficient physical intrusion detection in internet of things:A node deployment approach[J]. Computer networks,2019,154:28-46.
[8]SENTHILNAYAKI B,VENKATALAKSHMI K,KANNAN A. Intrusion detection system using fuzzy rough set feature selection and modified KNN classifier[J]. The internation arab journal of information technology,2019,16(4):746-753.
[9]AUNG Y Y,MIN M M. Hybrid intrusion detection system using K-Means and K-Nearest neighbors algorithms[C]//ACIS International Conference on Computer and Information Science(ICIS). Osaka,Japan:IEEE,2018:34-38.
[10]SAHU S K,KATIYAR A,KUMARI K M,et al. An SVM-based ensemble approach for intrusion detection[J]. International journal of information technology and Web engineering,2019,14(1):66-84.
[11]KAUR A,GULERIA K,TRIVEDI N K. Feature selection in machine learning:methods and comparison[C]//2021 International Conference on Advance Computing and Innovative Technologies in Engineering(ICACITE). Greater Noida,India:IEEE,2021:789-795.
[12]任晓奎,缴文斌,周丹. 基于粒子群的加权朴素贝叶斯入侵检测模型[J]. 计算机工程与应用,2016,52(7):122-126.
[13]YU N. A novel selection method of network intrusion optimal route detection based on Naive Bayesian[J]. International journal of applied decision sciences,2018,11(1):1
[14]LIANG J,MA M,SADIQ M,et al. A filter model for intrusion detection system in vehicle Ad Hoc Networks:A hidden Markov Methodology[J]. Knowledge-based systems,2019,163:611-623.
[15]戴远飞,陈星,陈宏,等. 基于特征选择的网络入侵检测方法[J]. 计算机应用研究,2017,34(8):2429-2433.
[16]戴敏. 基于并行特征选择和分类的网络入侵检测方法[J]. 计算机工程与设计,2019,40(3):654-661.
[17]DEMSAR J. Statistical comparisons of classifiers over multiple data sets[J]. The journal of machine learning research,2006,7:1-30
[18]NEMENYI P B. Distribution-free multiple comparisons[M]. USA:Princeton University,1963.
[19]赵洪斌. 多时间尺度下基于相关系数的光伏电站出力特性分析[J]. 青海大学学报,2020,38(5):60-65.
[20]KOCHER G,GUISHAN K A.Analysis of machine learning algo-rithms with feature selection for intrusion detection using UNSW-NB15 dataset[J]. International journal of network security & its applications,2021,13(1):21-31.
[21]李俊,夏松竹,兰海燕,等. 基于GRU-RNN的网络入侵检测方法[J]. 哈尔滨工程大学学报,2021,42(6):879-884.
[22]JAYSM,MANOLLAS. Efficient deep CNN-BiLSTM model for network intrusion detection[C]//Proceedings of the 3rd International Conference on Artificial Intelligence and Pattern Recognition. Xiamen:Semantic Scholoar,2020.