共 16 条
[1]
[Anonymous], 2004, B.S. thesis,
[2]
caida, 2013, DOWNLOADS CAIDA ONLI
[3]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217
[4]
.kaggle, UNR IDD INTRUSION DE
[5]
kdd.ics.uci, Kdd cup 1999 data
[6]
The 1999 DARPA off-line intrusion detection evaluation
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
2000, 34 (04)
:579-595
[7]
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[8]
"Why Should I Trust You?" Explaining the Predictions of Any Classifier
[J].
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2016,
:1135-1144
[9]
Sangster B., 2009, Proceedings of the 2nd conference on Cyber security experimentation and test, P9
[10]
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
[J].
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2018,
:108-116