[1]http://www.cert.org/stats。
[2]Doyle, J., Kohane, I., Long W., Shrobe, H., and Peter, S., “Event Recognition Beyond Signature and Anomaly,” Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 17-23, 2001.
[3]Safaa O. Al-Mamory, and Hongli Zhang, “Intrusion detection alarms reduction using root cause analysis and clustering,” Proceedings of the ScienceDirect, Workshop on Computer Communications, Computer Science and Technology, Harbin Institute of Technology, China, pp. 419-430, 2009.
[4]Chia-Mei Chen, Ya-Lin Chen, and Hsiao-Chung Lin, “An efficient network intrusion detection,” Proceedings of the ScienceDirect, Proceedings of Computer Communications, Information Management, National Sun Yat-Sen University, Taiwan, pp. 477-484, 2010.
[5]Kamran Shafi, and Hussein A. Abbass, “An adaptive genetic-based signature learning system for intrusion detection,” Proceedings of the ScienceDirect, Proceedings of Expert Systems with Applications, Information Technology and Electrical Engineering, Australian Defence Force Academy, Australia, pp. 12036-12043, 2009.
[6]Ming-Yang Su, Gwo-Jong Yu, and Chun-Yuen Lin, “A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach,” Proceedings of the ScienceDirect, Workshop on computers & security, Computer Science and Information Engineering, Ming Chuan University and Aletheia University, Taiwan, pp. 301-309, 2009.
[7]Chih-Fong Tsai, and Chia-YingLin, “A triangle area based nearest neighbors approach to intrusion detection,” Proceedings of the ScienceDirect, Workshop on Pattern Recognition, Information Management, National Central University, Taiwan, pp. 222-229, 2010.
[8]詹益東,“網路異常入侵偵測分類效能改善方法”,碩士論文,國防大學中正理工學院資訊科學所,桃園,2010。[9]潘致誠,“強健式網路入侵偵測演算法則之研究”,碩士論文,國防大學中正理工學院資訊科學所,桃園,2009。[10]http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html。
[11]Tan, P. N., Steinbach, M., and Kumar, V., Introduction to Data Mining, Pearson Addison Wesley, U.S.A, 2006.
[12]竇祥霖,“異質式階層分類架構的設計與運用”,碩士論文,國防大學中正理工學院資訊科學所,桃園,2008。[13]尹相志,Microsoft SQL Server 2005 資料採礦聖經,學貫行銷股份有限公司,台北,第4-20、4-21頁,2007。
[14]Haibo He, and Edwardo A. Garcia, “Learning from Imbalanced Data,” Knowledge and Data Engineering, vol. 21, no. 9, pp. 1263-1284, 2009.
[15]Elkan, C., “Results of the KDD'99 classifier learning”, ACM SIGKDD Explorations, pp. 63–64, 2000.
[16]葉志飛,文益民,呂寶糧,“不平衡分類問題研究綜述”, 智能系統學報,第四卷,第二期,第148-156頁,2009。
[17]Qiong Gu, Zhihua Cai, Li Zhu, and Bo Huang, “Data Mining on Imbalanced Data Sets, ” 2008 International Conference on Advanced Computer Theory and Engineering, 2008.
[18]林智勇,郝志峰,楊曉偉,“不平衡數據分類的研究現狀”,計算機應用研究,第二十五卷,第二期,第332-336頁,2008。
[19]張琦、吳斌、王柏,“非平衡數據訓練方法概述”,計算機科學,第三十二卷,第十期,第181-186頁,2005。
[20]N.V. Chawla, K.W. Bowyer, L.O. Hall, and W.P. Kegelmeyer, “SMOTE: Synthetic Minority Over-Sampling Technique,” Artificial Intelligence Research, Vol. 16, pp. 321–357, 2002.
[21]Naeem Seliya, Zhiwei Xu, and Taghi M. Khoshgoftaar, “Addressing Class Imbalance in Non-Binary Classification Problems,” 20th IEEE International Conference on Tools with Artificial Intelligence, 2008.
[22]Abu H. M Kamal, Xingquan Zhu, Abhijit Pandya and Sam Hsu, “Feature Selection with Biased Sample Distributions,” IEEE IRI 2009, 2009.
[23]楊正三,葉明龍,莊麗月,陳禹融,楊正宏,“利用資訊增益與瀰集演算法於基因微陣列之特徵選取與分類問題”,資訊科技國際期刊,第二卷,第十期,第50-62頁,2008。[24]朱芳輝,“資料選取方法於鑑別式聲學模型訓練之研究”,碩士論文,國立台灣師範大學,台北,2008。[25]Robi Polikar, “Ensemble based systems in decision making,” IEEE Circuits and Systems Magazine, Vol. 6, pp. 21-45, 2006.
[26]Weiming Hu, Wei Hu, and Steve Maybank, “AdaBoost-Based Algorithm for Network Intrusion Detection,” Proceedings of the 2008 IEEE, Workshop on IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, Senior Member, IEEE, vol. 38, no. 2, pp. 1083-4419, 2008.
[27]Rajeswari, L. P., and Kannan, A. “An Intrusion Detection System Based on Multiple Level Hybrid Classifier using Enhanced C4.5” IEEE International Conference on Signal processing, Communications and Networking, India, Jan 4-6, 2008. pp. 75-79, 2008.
[28]http://www.cs.waikato.ac.nz/ml/weka/。