共 18 条
[1]
Adekanmbi O., 2022, 2022 IEEEACIS 20 INT
[2]
Alazzam H., 2019, P 2 INT C DATA SCI E, P1
[3]
Assefi M, 2017, IEEE INT CONF BIG DA, P3492
[4]
Atefinia R., 2022, Journal of Computing Security, V9, P57, DOI [10.22108/JCS.2022.131400.1085, DOI 10.22108/JCS.2022.131400.1085]
[5]
Babcock University, 2017, International Journal of Computer Trends and Technology, V48, P128, DOI [10.14445/22312803/ijctt-v48p126, 10.14445/22312803/IJCTT-V48P126, DOI 10.14445/22312803/IJCTT-V48P126]
[6]
Performance evaluation of intrusion detection based on machine learning using Apache Spark
[J].
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017),
2018, 127
:1-6
[7]
Elsherif AA, 2020, Journal of Information Security and Cybercrimes Research, V3, P64, DOI 10.26735/zrxn1433
[8]
Fu J, 2016, 2016 2ND INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS - COMPUTING TECHNOLOGY, INTELLIGENT TECHNOLOGY, INDUSTRIAL INFORMATION INTEGRATION (ICIICII), P48, DOI [10.1109/ICIICII.2016.27, 10.1109/ICIICII.2016.0023]
[9]
A Big Data Analysis Framework Using Apache Spark and Deep Learning
[J].
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017),
2017,
:9-16