共 104 条
- [11] Arp D, 2021, Arxiv, DOI arXiv:2010.09470
- [13] Belouch M, 2017, INT J ADV COMPUT SC, V8, P389
- [14] Belous V., 2020, Computer viruses, malicious logic, andspyware,'' inViruses, Hardware and Software Trojans, P101, DOI [10.1007/978-3-030-47218-42.4J, DOI 10.1007/978-3-030-47218-42.4J]
- [15] Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (03): : 1701 - 1714
- [17] A Deep Learning-Based Intrusion Detection and Preventation System for Detecting and Preventing Denial-of-Service Attacks [J]. IEEE ACCESS, 2022, 10 : 83043 - 83060
- [18] Towards a taxonomy of intrusion-detection systems [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 805 - 822
- [19] Minimum redundancy feature selection from microarray gene expression data [J]. PROCEEDINGS OF THE 2003 IEEE BIOINFORMATICS CONFERENCE, 2003, : 523 - 528
- [20] Divekar A, 2018, PROCEEDINGS ON 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), P1, DOI 10.1109/CCCS.2018.8586840