共 88 条
- [1] Abd Jalil K, 2010, INT CONF NETWORK INF, P221, DOI 10.1109/ICNIT.2010.5508526
- [2] Agrawal R., 1994, P 20 INT C VER LARG, P487
- [4] Al Tawil Arar, 2021, 2021 International Conference on Information Technology (ICIT), P377, DOI 10.1109/ICIT52682.2021.9491690
- [5] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
- [6] Al-Yaseen Wathiq Laftah, 2019, IAENG International Journal of Computer Science, V46, P534
- [7] Review on Feature Selection Algorithms for Anomaly-Based Intrusion Detection System [J]. RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 605 - 619
- [8] A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 409 - 429
- [9] Anushiya R, 2023, Measur Sensors, V26, DOI DOI 10.1016/J.MEASEN.2023.100700
- [10] Atashpaz-Gargari E, 2007, IEEE C EVOL COMPUTAT, P4661, DOI 10.1109/cec.2007.4425083