共 56 条
[1]
Abadi M., 2015, TENSORFLOW LARGE SCA, V1, DOI DOI 10.5281/ZENODO.8071599
[2]
Al Ger, 2019, Kerastuner
[3]
Alani M. M., 2014, Guide to OSI and TCP/IP Models
[4]
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.167, 10.1109/ICMLA.2016.0040]
[5]
[Anonymous], JAXA. 2022. Available at: https://www.eorc.jaxa.jp/ALOS/en/dataset/fnf_e.htm/. (Accessed: 11 May 2023)
[6]
[Anonymous], CSO (Central Statistics Office), 2011. [online]. [Accessed November 2018]. Available from: https://www.cso.ie/en/releasesandpublications/ep/p-cp8iter/p8iter/p8itd/
[8]
DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2023, 140
:266-281
[9]
Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021),
2021,
:7-12
[10]
Farahnakian F, 2018, INT CONF ADV COMMUN, P178, DOI 10.23919/ICACT.2018.8323688