参考文献(References):
[1] 陈希,罗齐贤,何海良.基于AP2DR2A+ET的企业信息安全框架研究[J].企业技术开发,2016,35(10):12-15,23.
[2] YANG Y,XU H Q,GAO L,et al.Multidimensional intrusion detection system for IEC 61850-based SCADA networks[J].IEEE Transactions on Power Delivery,2017,32(2):1068-1078.
[3] ZONOUZ S A,KHURANA H,SANDERS W H,et al.RRE:a game-theoretic intrusion response and recovery engine[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(2):395-406.
[4] NGUYEN H T,SRIBOONCHITTA S,WU B.A statistical basis for fuzzy engineering economics[J].International Journal of Fuzzy Systems,2015,17(1):1-11.
[5] 王贵君,何英,李晓萍.基于MISO折线模糊神经网络的优化算法[J].中国科学:信息科学,2015,45(5):650-667.
[6] CHEN L P,LIU Y G,HUANG Z X,et al.An improved SOM algorithm and its application to color feature extraction[J].Neural Computing and Applications,2014,24(7/8):1759-1770.
[7] SALEHI H,ZEINALI-HERIS S,ESFANDYARI M,et al.Erratum to:neuro-fuzzy modeling of the convection heat transfer coefficient for the nanofluid[J].Heat and Mass Transfer,2015,51(7):1049.
[8] 杨飞,李静,周亮.SOM图像分割算法在GPU上并行优化分析[J].控制工程,2019,26(9):1770-1775.
[9] ABDULKADIR H.A neuro-fuzzy two-stage clustering approach to customer segmentation[J].Journal of Marketing Analytics,2013,1(4):202-221.
[10] 杨雅辉,黄海珍,沈晴霓,等.基于增量式GHSOM神经网络模型的入侵检测研究[J].计算机学报,2014,37(5):1216-1224.
[11] 杜晔,张亚丹,黎妹红,等.基于改进FastICA算法的入侵检测样本数据优化方法[J].通信学报,2016,37(1):42-48.
[12] FIANNACA A,FATTA G D,RIZZO R,et al.Simulated anneal-ing technique for fast learning of SOM networks[J].Neural Computing and Applications,2013,22(5):889-899.
[13] 胡晓雪,赵嵩正,吴楠.基于SOM-DB-PAM混合聚类算法的电力客户细分[J].计算机工程,2015,41(10):295-301,308.
[14] RAHMAN M M.A soft image representat-ion approach by exploiting local neighborhood structure of self-organizing map (SOM)[J].Soft Computing,2016,20(7):2759-2769.
[15] INAYAT Z,GANI A,ANUAR N B,et al.Cloud-based intrusion detection and response system:open research issues,and solutions[J].Arabian Journal for Science and Engineering,2017,42(2):399-423.
[16] 刘开旻,吴小俊.一种基于新隶属度函数的模糊支持向量机[J].计算机工程,2016,42(4):155-159.
[17] 王鹏程,杨国栋,张晓晨,等.宝华玉兰生存群落的自组织特征映射网络排序与分类[J].浙江农林大学学报,2019,36(2):255-263.
[18] 周丽娟.基于自组织映射网络的网络入侵检测算法设计[J].成都大学学报(自然科学版),2018,37(3):296-298,302.