共 39 条
[1]
Althubiti SA, 2018, 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P293
[3]
Årnes A, 2006, LECT NOTES COMPUT SC, V4219, P145
[4]
Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:117-123
[6]
Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks
[J].
EMERGING TECHNOLOGIES IN COMPUTER ENGINEERING: MICROSERVICES IN BIG DATA ANALYTICS,
2019, 985
:45-54
[7]
Chen CM, 2016, INT J INNOV COMPUT I, V12, P569
[8]
Choubisa M., 2022, 2022 INT C IOT BLOCK, P1
[9]
da Costa VGT, 2017, IEEE ICC