共 69 条
[54]
Sharafaldin I, 2019, INT CARN CONF SECU, DOI 10.1109/ccst.2019.8888419
[55]
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
[J].
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2018,
:108-116
[56]
A Deep Learning Approach to Network Intrusion Detection
[J].
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE,
2018, 2 (01)
:41-50
[57]
Sic ic I., 2023, P 17 INT C TEL CONTE, P1
[58]
Stiawan D., 2020, IEEE ACCESS, V8, P132911, DOI DOI 10.1109/ACCESS.2020.3009843
[60]
Ustebay S, 2018, 2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), P71, DOI 10.1109/IBIGDELFT.2018.8625318