共 17 条
- [1] Ahmed M.E., 2018, Medusa: malware detection using statistical analysis of system's behavior
- [2] bazaar.abuse.ch, abuse.ch: Sha256 edfe81babf50c2506853fd8375f1be0b7bebbefb2-5e9a33eff95ec23e867 de1
- [3] Brownlee J., 2020, A gentle introduction to the rectified linear unit (ReLU)
- [4] Brownlee J, 2021, Gentle introduction to the adam optimization algorithm for deep learning
- [5] Cyberwire T., signature-based detection
- [6] AN INTRUSION-DETECTION MODEL [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
- [7] Gavrilut Dragos, 2009, Proceedings of the 2009 International Multiconference on Computer Science and Information Technology (IMCSIT), P735, DOI 10.1109/IMCSIT.2009.5352759
- [8] Griffiths C., 2023, The latest 2023 cyber crime statistics
- [10] Lane Terran., 1997, An application of machine learning to anomaly detection