共 27 条
[1]
Agrawal S., Agrawal J., Survey on Anomaly Detection using Data Mining Techniques, Procedia Computer Science, 60, 6, pp. 708-713, (2015)
[2]
Ahmad I., Iskandar B.S., Application of artificial neural network in detection of DoS attacks, Proceedings of the 2nd International Conference on Security of Information and Networks, pp. 229-234, (2009)
[3]
Almseidin M., Alzubi M., Kovacs S., Alkasassbeh M., Evaluation of machine learning algorithms for intrusion detection system, IEEE 15th International Symposium on Intelligent Systems and Informatics, pp. 277-282, (2017)
[4]
Amor N., Benferhat S., Cnrs C., Souvraz R.J., Naive Bayes vs decision trees in intrusion detection systems, Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420-424, (2004)
[5]
Armentano R., Bhadoria R., Chatterjee P., Deka G., The Internet of Things: Foundation for Smart Cities, EHealth, and Ubiquitous Computing, (2017)
[6]
Belavagi M.C., Muniyal B., Performance evaluation of supervised machine learning algorithms for intrusion detection, Procedia Computer Science, 89, 4, pp. 117-123, (2016)
[7]
Bhadoria R.S., Chaudhari N.S., Pragmatic sensory data semantics with serviceoriented computing, Journal of Organizational and End User Computing, 31, 2, pp. 22-36, (2019)
[8]
Borovcnik M., Bentz H.-J., Kapadia R., A probabilistic perspective, Chance Encounters: Probability in Education, (1991)
[9]
Bul W., James A., Pannu M., Improving network intrusion detection system performance through quality of service configuration and parallel technology, Journal of Computer and System Sciences, 81, 6, pp. 981-999, (2015)
[10]
Gharibian F., Ghorbani A.A., Comparative study of supervised machine learning techniques for intrusion detection, Fifth Annual Conference on Communication Networks and Services Research, pp. 350-358, (2007)