共 49 条
[11]
AN INTRUSION-DETECTION MODEL
[J].
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1987, 13 (02)
:222-232
[12]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217
[13]
Geva M, 2021, Arxiv, DOI [arXiv:2012.14913, 10.48550/arXiv.2012.14913]
[14]
Ghorbani AA, 2010, ADV INFORM SECUR, V47, P1, DOI 10.1007/978-0-387-88771-5
[17]
Layered higher order n-grams for hardening payload based anomaly intrusion detection
[J].
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS,
2010,
:321-326
[18]
Jing DS, 2019, INT CONF ASIC