共 70 条
[1]
Performance Analysis of Anomaly Based Network Intrusion Detection Systems
[J].
PROCEEDINGS OF THE 2018 43RD ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS),
2018,
:1-7
[3]
Cyber Security Attacks on Smart Cities and Associated Mobile Technologies
[J].
8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017),
2017, 109
:1086-1091
[5]
[Anonymous], 2009, NSL KDD
[6]
Bace R., 2001, Technical Report 800-31
[7]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[9]
Charbuty B., 2021, JASTT, V2, P20, DOI [DOI 10.38094/JASTT20165, 10.38094/jastt20165]
[10]
Chen J, 2022, FEDDEF DEFENSE GRADI