共 49 条
[3]
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[4]
GAN augmentation to deal with imbalance in imaging-based intrusion detection
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2021, 123 (123)
:108-127
[5]
Arp D., 2022, PROC USENIX SECURITY
[6]
Bickel S., 2005, P HUMAN LANGUAGE TEC, P193
[7]
POSEIDON: a 2-tier anomaly-based network intrusion detection system
[J].
FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS,
2006,
:144-+
[8]
A quantitative approach for intrusions detection and prevention based on statistical n-gram models
[J].
ANT 2012 AND MOBIWIS 2012,
2012, 10
:450-457
[9]
Brown P. F., 1992, Computational Linguistics, V18, P467