共 168 条
[1]
Ahmed I., 2016, 2 ANN IND CONTR, P1, DOI DOI 10.1145/3018981.3018984
[4]
Ahmed M., IND NETW INTELL SYST, V2
[5]
Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection
[J].
2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW),
2014,
:177-181
[6]
Almalawi A., 2020, SCADA SECURITY MACHI
[7]
[Anonymous], CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.14)
[8]
[Anonymous], 2012, P 1 ANN C RES INF TE, DOI [DOI 10.1145/2380790.2380805, 10.1145/2380790.2380805]
[9]
[Anonymous], CWE 22 IMPROPER LIMI
[10]
[Anonymous], 1994, SWAT SOIL WATER ASSE, DOI DOI 10.16747/J.CNKI.CN61-1109/TV.2018.06.102