共 27 条
[1]
A multi-device multi-tasks management and orchestration architecture for the design of enterprise IoT applications
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 106
:482-500
[2]
Alani M.M., 2022, ADV NATURE INSPIRED, P9, DOI [10.1007/978-3-030-90708-2_2, DOI 10.1007/978-3-030-90708-2_2]
[4]
Implementation-Oriented Feature Selection in UNSW-NB15 Intrusion Detection Dataset
[J].
INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA 2021,
2022, 418
:548-558
[5]
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS,
2018, 48 (02)
:207-223
[7]
[Anonymous], 2022, ZEEK NETWORK SECURIT
[8]
[Anonymous], 2022, TSHARK 1
[9]
Awad A.I., 2021, SECURITY PRIVACY INT, V1st ed.