共 16 条
[1]
[Anonymous], 2004, B.S. thesis,
[2]
[Anonymous], 2006, Description of Kyoto University Benchmark Data
[3]
caida, 2013, DOWNLOADS CAIDA ONLI
[4]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217
[5]
.kaggle, UNR IDD INTRUSION DE
[6]
kdd.ics.uci, KDD CUP 1999 data
[7]
The 1999 DARPA off-line intrusion detection evaluation
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
2000, 34 (04)
:579-595
[8]
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[9]
"Why Should I Trust You?" Explaining the Predictions of Any Classifier
[J].
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2016,
:1135-1144
[10]
Sangster B., 2009, Proceedings of the 2nd conference on Cyber security experimentation and test, P9