共 38 条
[1]
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.167, 10.1109/ICMLA.2016.0040]
[2]
Anbar Mohammed, 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P282, DOI 10.1109/PST.2016.7906975
[3]
[Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
[4]
[Anonymous], 2016, PROC 9 EAI INT C BIO, DOI DOI 10.4108/EAI.3-12-2015.2262516
[5]
Aung YY, 2017, 2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), P127, DOI 10.1109/SNPD.2017.8022711
[6]
Bellekens X. J. A., 2017, ACM SURVEY UNPUB ACM SURVEY UNPUB
[8]
Network intrusion detection based on random forest and support vector machine
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1,
2017,
:635-638
[9]
Choudhury S, 2015, 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), P89, DOI 10.1109/ICSTM.2015.7225395
[10]
Cordero Carlos Garcia, 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P317, DOI 10.1109/PST.2016.7906980