共 93 条
[1]
Abdelhamid N, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P72, DOI 10.1109/ISI.2017.8004877
[2]
Survey on Anomaly Detection using Data Mining Techniques
[J].
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015,
2015, 60
:708-713
[3]
A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models
[J].
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS),
2019,
:228-233
[4]
Alkasassbeh M, 2016, INT J ADV COMPUT SC, V7, P436
[5]
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.0040, 10.1109/ICMLA.2016.167]
[6]
Alseiari FAA, 2015, INT CONF SMART GR C, P148, DOI 10.1109/ICSGCE.2015.7454287
[7]
Ammar A., 2015, Journal of Computer and Communications, V3, P52
[8]
Anderson James P., 1980, Tech. Rep
[9]
[Anonymous], 2008, P 25 INT C MACH LEAR
[10]
Design and Implementation of Intrusion Detection System using Convolutional Neural Network for DoS Detection
[J].
2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2018),
2015,
:34-38