[1] 黄世泽,王梦莹,徐秋勇,等.基于Hash变换的智能配电系统通信安全性研究[J]. 电器与能效管理技术,2018(21):30-35. [2] CHANDOLA V,BANERJEE A,KUMAR V.Anomaly detection:A survey[J].ACM Computing Surveys (CSUR),2009,41(3):1-58. [3] LI Y,WANG L,TIAN Z H,et al.Building lightweight intrusion detection system using wrapper-based feature selection mechanisms[J].Computers & Security,2009,28(6):466-475. [4] 陶琳,郭春璐.改进粒子群算法和支持向量机的网络入侵检测[J].计算机系统应用,2016,25(6):269-273. [5] KONENKO I.Estimating attributes:Analysis and extensions of RELIEF[M].Machine Learning:ECML-94.Springer Berlin Heidelberg,1994. [6] KENJI KIRA,LARRY A. RENDELL.The feature selection problem:traditional methods and a new algorithm[C]//National Conference on Artificial Intelligence San Jose,AAAI Press,1992. [7] CAI D,ZHANG C,HE X.Unsupervised feature selection for multi-cluster data[C]//Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining-KDD’10,Washington,DC,2010. [8] PENG H,LONG F,DING C.Feature selection based on mutual information criteria of max-dependency,max-relevance,and min-redundancy[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2005,27(8):1226-1238. [9] HASTIE T,TIBSHIRANI R.Discriminant adaptive nearest neighbor classification and regression[C]//Advances in Neural Information Processing Systems 8,NIPS,Denver,CO,November 27-30, 1995. |