共 99 条
[1]
Aggarwal CC, 2001, LECT NOTES COMPUT SC, V1973, P420
[3]
Alazab A., 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT), P296, DOI 10.1109/ISCIT.2012.6380910
[4]
Amor N. B., 2004, P ACM S APPL COMP
[5]
[Anonymous], Opportunity Insights: Economic Tracker
[6]
[Anonymous], 2021, Ahlashkari CICFLOWMETER/README.TXT at Master Ahlashkari/Cicflowmeter
[7]
[Anonymous], 2018, CSE-CIC-IDS2018
[8]
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
[J].
DIGITAL THREATS: RESEARCH AND PRACTICE,
2022, 3 (03)