共 54 条
[1]
Chang MA, 2020, Arxiv, DOI arXiv:2004.10275
[3]
A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms
[J].
SYMMETRY-BASEL,
2020, 12 (06)
:1-20
[5]
Network Vulnerability Analysis on Brain Signal/Image Databases Using Nmap and Wireshark Tools
[J].
IEEE ACCESS,
2018, 6
:57144-57151
[6]
Belouch M, 2017, INT J ADV COMPUT SC, V8, P389
[7]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[8]
Chou T-S., 2008, INT J COMPUTATIONAL, V4, P196
[9]
Creech G, 2013, 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P4487