共 96 条
- [21] Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach [J]. INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 136 - 147
- [22] [Anonymous], 2016, Journal of Mathematical Sciences: Advances and Applications, V37, P51, DOI DOI 10.18642/JMSAA_7100121627
- [23] Aslan O, 2022, Inf Technol J, V15, P149, DOI [10.17671/gazibtd.1002178, DOI 10.17671/GAZIBTD.1002178]
- [24] Aysa MH, 2020, 4 INT S MULT STUD IN, P1
- [25] Bahsi H, 2018, I C CONT AUTOMAT ROB, P1857, DOI 10.1109/ICARCV.2018.8581205
- [28] Bhavsar M., 2023, Discover Internet of Things, V3, DOI DOI 10.1007/S43926-023-00034-5
- [30] A survey on feature selection methods [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) : 16 - 28