共 128 条
[31]
Branch P, 2012, C LOCAL COMPUT NETW, P85, DOI 10.1109/LCN.2012.6423690
[34]
Bujlow T., 2012, 2012 International Conference on Computing, Networking and Communications (ICNC), P237, DOI 10.1109/ICCNC.2012.6167418
[35]
Burschka S, 2016, PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI)
[36]
An Improved Network Traffic Classification Model Based on a Support Vector Machine
[J].
SYMMETRY-BASEL,
2020, 12 (02)
[37]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[38]
Applied Comparative Evaluation of the Metasploit Evasion Module
[J].
2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC),
2019,
:946-951
[39]
Chen ZT, 2017, IEEE INT CONF BIG DA, P1271, DOI 10.1109/BigData.2017.8258054
[40]
Chengjie Gu, 2011, Journal of Software, V6, P1009, DOI 10.4304/jsw.6.6.1009-1016