共 27 条
[1]
Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests
[J].
2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM),
2019,
:465-470
[2]
Bochkovskiy A, 2020, PREPRINT, DOI 10.48550/ARXIV.2004.10934
[3]
Chen Haiyan, 2023, Journal of Huazhong University of Science and Technology (Natural Science Edition), P60, DOI 10.13245/j.hust.238491
[4]
Dehghan A., 2023, Expert Syst Appl, P232
[6]
Howard AG, 2017, Arxiv, DOI [arXiv:1704.04861, 10.48550/arXiv.1704.04861]
[7]
Gevorgyan Z, 2022, Arxiv, DOI arXiv:2205.12740
[8]
GhostNet: More Features from Cheap Operations
[J].
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2020,
:1577-1586
[9]
Jing Gong, 2020, 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), P253, DOI 10.1109/ICPICS50287.2020.9201995
[10]
Jocher G., 2020, Zenodo