共 72 条
[32]
Hyndman R.J., 2018, FORECASTING PRINCIPL, V2nd
[34]
KIM S., 2024, Supplement to Spatio-Temporal Analysis of Dependent Risk with an Application to Cyberattacks Data, DOI [10.121424-AOAS1952SUPPA, 10.121424-AOAS1952SUPPB]
[35]
Kodinariya T.M. P.R. Makwana., 2013, INT J ADV RES COMPUT, V1, P90
[38]
An Empirical Study on Network Anomaly Detection using Convolutional Neural Networks
[J].
2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS),
2018,
:1595-1598
[40]
Statistical models for the number of successful cyber intrusions
[J].
JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS,
2018, 15 (01)
:49-63