共 21 条
- [1] Anderson James P., 1980, Computer Security Threat Monitoring and Surveillance
- [2] A Comparative Analysis of Different Intrusion Detection Techniques in Cloud Computing [J]. ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 358 - 378
- [4] Besharati E., LR-HIDS: logistic regression host-based intrusion detection system for cloud environments
- [5] C. S. Alliance, 2022, White Paper
- [6] FCM-SVM based intrusion detection system for cloud computing environment [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 3221 - 3231
- [7] Krishnaveni S., Network intrusion detection based on ensemble classification and feature selection method for cloud computing, V34
- [8] Liu M, 2022, Arxiv, DOI arXiv:2109.11821
- [9] A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2685 - 2696