共 64 条
- [41] Sarhan M., 2022, Digit. Commun. Netw.
- [43] Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 108 - 116
- [44] Sheikh TU, 2019, 2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), P1130, DOI [10.1109/IEMCON.2019.8936231, 10.1109/iemcon.2019.8936231]
- [46] TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (01): : 17 - 35
- [47] A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (02): : 1191 - 1221
- [48] Lightweight Classification of IoT Malware Based on Image Recognition [J]. 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 664 - 669
- [49] Sun SQ, 2019, 2019 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING AND THE 9TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING (EMNLP-IJCNLP 2019), P4323
- [50] Tan MX, 2019, PROC CVPR IEEE, P2815, DOI [arXiv:1807.11626, 10.1109/CVPR.2019.00293]