共 38 条
- [1] Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.167, 10.1109/ICMLA.2016.0040]
- [2] Anbar Mohammed, 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P282, DOI 10.1109/PST.2016.7906975
- [3] [Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
- [4] [Anonymous], 2016, PROC 9 EAI INT C BIO, DOI DOI 10.4108/EAI.3-12-2015.2262516
- [5] Aung YY, 2017, 2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), P127, DOI 10.1109/SNPD.2017.8022711
- [6] Bellekens X. J. A., 2017, ACM SURVEY UNPUB ACM SURVEY UNPUB
- [8] Network intrusion detection based on random forest and support vector machine [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 635 - 638
- [9] Choudhury S, 2015, 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), P89, DOI 10.1109/ICSTM.2015.7225395
- [10] Cordero Carlos Garcia, 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P317, DOI 10.1109/PST.2016.7906980