共 42 条
- [1] Abolhasanzadeh B., 2015, 2015 7th Conference on Information and Knowledge Technology (IKT), P1, DOI [DOI 10.1109/IKT.2015.7288799, 10.1109/IKT.2015.7288799]
- [2] Survey on Anomaly Detection using Data Mining Techniques [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
- [3] Alom MZ, 2017, PROC NAECON IEEE NAT, P63, DOI 10.1109/NAECON.2017.8268746
- [4] Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
- [5] Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning [J]. INFORMATION SECURITY APPLICATIONS, 2018, 10763 : 212 - 223
- [6] Anani W, 2018, CAN CON EL COMP EN
- [7] Austin J, 2021, ADV NEUR IN
- [8] Batzolis G, 2021, Arxiv, DOI arXiv:2111.13606