共 56 条
- [1] Abadi M., 2015, TensorFlow. Large-Scale Machine Learning on Heterogeneous Systems, V1
- [2] Al Ger, 2019, Kerastuner
- [3] Alani M. M., 2014, Guide to OSI and TCP/IP Models
- [4] Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.167, 10.1109/ICMLA.2016.0040]
- [5] [Anonymous], JAXA. 2022. Available at: https://www.eorc.jaxa.jp/ALOS/en/dataset/fnf_e.htm/. (Accessed: 11 May 2023)
- [6] [Anonymous], CSO (Central Statistics Office), 2011. [online]. [Accessed November 2018]. Available from: https://www.cso.ie/en/releasesandpublications/ep/p-cp8iter/p8iter/p8itd/
- [8] DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 140 : 266 - 281
- [9] Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study [J]. 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 7 - 12
- [10] Farahnakian F, 2018, INT CONF ADV COMMUN, P178, DOI 10.23919/ICACT.2018.8323688