共 31 条
[21]
Saxena H., Richariya V., Intrusion detection in KDD99 dataset using SVM-PSO and feature reduction with information gain, International Journal of Computer Applications, 98, 6, pp. 25-29, (2014)
[22]
Shannon C.E., A mathematical theory of communication, ACM SIGMOBILE Mobile Computing and Communications Review, 5, 1, pp. 3-55, (2001)
[23]
Sharma R., Guleria A., Singla R.K., An overview of flow-based anomaly detection, International Journal of Communication Networks and Distributed Systems, 21, 2, pp. 220-240, (2018)
[24]
Sharma R., Guleria A., Singla R.K., Characterizing network flows for detecting DNS, NTP, and SNMP anomalies, Proceedings of Intelligent Computing and Information and Communication, pp. 327-340, (2018)
[25]
Sharma R., Singla R.K., Guleria A., A new labeled flow-based DNS dataset for anomaly detection: PUF dataset, Procedia Journal of Computer Science, 132, 2, pp. 1458-1466, (2017)
[26]
Smyl S., A hybrid method of exponential smoothing and recurrent neural networks for time series forecasting, International Journal of Forecasting, 36, 1, pp. 75-85, (2020)
[27]
Sperotto A., Schaffrath G., Sadre R., Morariu C., Pras A., Stille B., An overview of IP flow-based intrusion detection, IEEE Communications Surveys and Tutorials, 12, 3, pp. 343-356, (2010)
[28]
Usha M., Kavitha P., Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier, Wireless Networks, 23, 8, pp. 2431-2446, (2017)
[29]
Winters P.R., Forecasting sales by exponentially weighted moving averages, Management Science, 6, 3, pp. 324-342, (1960)
[30]
Yaacob A.H., Tan I.K., Chien S.F., Tan H.K., ARIMA based network anomaly detection, Proceedings of 2nd International Conference on Communication Software and Networks ICCSN‘2010, pp. 205-209, (2010)