共 54 条
[2]
Hidden Markov models for malware classification
[J].
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2015, 11 (02)
:59-73
[3]
[Anonymous], 2005, P 43 ANN SE REG C, DOI DOI 10.1145/1167253.1167288
[4]
[Anonymous], 2020, World vehicles-in-use
[5]
Bay SD., 2000, ACM SIGKDD Explorations Newsletter-Special issue on "Scalable data mining algorithms", V2, P81, DOI 10.1145/380995.381030
[7]
Dosovitskiy A, 2021, Arxiv, DOI [arXiv:2010.11929, 10.48550/arXiv.2010.11929, DOI 10.48550/ARXIV.2010.11929]
[8]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217
[9]
Hasan M. A. M., 2014, J. Intell. Learn. Syst. Appl., V2014, P45, DOI DOI 10.4236/JILSA.2014.61005