共 43 条
[31]
Paxson V., Bro: A system for detecting network intruders in real-time, Computer Networks, 31, 23, pp. 2435-2463, (1999)
[32]
Pedregosa F., Varoquaux G., Gramfort A., Michel V., Thirion B., Grisel O., Vanderplas J., Et al., Scikit-learn: Machine learning in python, Journal of Machine Learning Research, 12, pp. 2825-2830, (2011)
[33]
Sak H., Senior A., Beaufays F., Long short-term memory recurrent neural network architectures for large scale acoustic modeling, Fifteenth Annual Conference of The International Speech Communication Association, (2014)
[34]
Simonyan K., Vedaldi A., Zisserman A., Deep Inside Convolutional Networks: Visualizing Image Classification Models and Saliency Maps, (2013)
[35]
Staudemeyer R.C., Applying long short-term memory recurrent neural networks to intrusion detection, South African Computer Journal, 56, 1, pp. 136-154, (2015)
[36]
Staudemeyer R.C., Omlin C.W., Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data, Proceedings of The South African Institute for Computer Scientists and Information Technologists Conference, pp. 218-224, (2013)
[37]
Staudemeyer R.C., Omlin C.W., Extracting salient features for network intrusion detection using machine learning methods, South African Computer Journal, 52, 1, pp. 82-96, (2014)
[38]
Tavallaee M., Bagheri E., Lu W., Ghorbani A.A., A detailed analysis of the KDD CUP 99 data set, IEEE Symposium on Computational Intelligence for Security and Defense Applications CISDA’09, (2009)
[39]
Vaidya T., 2001-2013: Survey and Analysis of Major Cyberattacks, (2015)
[40]
Wang Z., The Applications of Deep Learning on Traffic Identification, (2015)