共 33 条
[1]
Ahmad Z., 2020, Transactions on Emerging Telecommunications Technologies, V32
[4]
Boggs Nathaniel, 2014, Research in Attacks, Intrusions and Defenses. 17th International Symposium (RAID 2014). Proceedings: LNCS 8688, P234, DOI 10.1007/978-3-319-11379-1_12
[6]
Domo, 2021, Data never sleeps 9.0
[7]
Fogla P, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P241
[8]
A Framework for Fast and Efficient Cyber Security Network Intrusion Detection using Apache Spark
[J].
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS,
2016, 93
:824-831
[9]
HajKacem M. A. B., 2021, Spark Based Intrusion Detection System Using Practical Swarm Optimization Clustering, P197
[10]
Knowledge Discovery from Big Data for Intrusion Detection Using LDA
[J].
2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS),
2014,
:760-761