共 158 条
[1]
Ahmadi M, 2018, IRAN CONF ELECTR ENG, P616, DOI 10.1109/ICEE.2018.8472577
[2]
Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
[J].
2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN),
2019,
[3]
Alexander D, 2016, Dynamic networks and cyber-security, P37, DOI [DOI 10.1142/97817863407570002, DOI 10.1142/9781786340757_0002]
[4]
Alkasassbeh M, 2018, Arxiv, DOI arXiv:1809.02610
[5]
[Anonymous], AUDITD 8 AUDIT DAEMO
[6]
[Anonymous], Home - Suricata
[7]
[Anonymous], 2021, TensorFlow: How-to Get Started with Machine Learning on Arduino
[8]
[Anonymous], 2016, SBUSTREAMSPOT SBUSTR
[9]
[Anonymous], 2010, OPEN PROVENANCE MODE
[10]
[Anonymous], 2009, CAIDA ANONYMIZED INT