共 61 条
[1]
Ahmad F. B., 2022, SECURING CLOUD DATA, DOI [10.21203/rs.3.rs-1315357/v1, DOI 10.21203/RS.3.RS-1315357/V1]
[3]
Al-Jaser N.M.A, 2020, INT J COMPUT SCI INF, V18
[4]
Albahar M, 2020, INT J ADV COMPUT SC, V11, P781
[5]
Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
[6]
Alrashdi I, 2019, 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P515, DOI [10.1109/uemcon47517.2019.8992963, 10.1109/UEMCON47517.2019.8992963]
[10]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176