共 98 条
[1]
Abolhasanzadeh B, 2015, 2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT)
[2]
ACKLEY DH, 1985, COGNITIVE SCI, V9, P147
[3]
Adhikari U., 2014, Industrial Control System (ICS) Cyber Attack Datasets
[4]
A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data
[J].
PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018),
2018,
:26-30
[5]
Survey on Anomaly Detection using Data Mining Techniques
[J].
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015,
2015, 60
:708-713
[6]
Al-Garadi M. Ali, 2018, ARXIV PREPRINT ARXIV
[7]
Al-zewairi M., 2017, IFIP INT WORKSHOP IN, V7322, DOI [10.1109/ICICS.2017.29, DOI 10.1109/ICICS.2017.29]
[8]
Alom MZ, 2017, PROC NAECON IEEE NAT, P63, DOI 10.1109/NAECON.2017.8268746
[9]
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[10]
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.0040, 10.1109/ICMLA.2016.167]

