共 67 条
[41]
Numenta, Numenta Anomaly Benchmark
[42]
Padhy R.P., 2011, Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS), V1, P136
[43]
Key Issues in Healthcare Data Integrity: Analysis and Recommendations
[J].
IEEE ACCESS,
2020, 8
:40612-40628
[44]
Patel KK., 2016, International journal of engineering science and computing, V6, DOI [DOI 10.4010/2016.1482.MAY, 10.4010/2016.1482, DOI 10.4010/2016.1482]
[46]
Response time optimization with enhanced fault-tolerant wireless sensor network design for on-board rapid transit applications
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2019, 22 (Suppl 4)
:S9737-S9753
[48]
Saleh ME, 2016, INT J ADV COMPUT SC, V7, P390, DOI 10.14569/ijacsa.2016.070651
[49]
IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model
[J].
SYMMETRY-BASEL,
2020, 12 (05)