共 65 条
[21]
Hussain F., 2020, 2020 IEEE 23 INT MUL, P1, DOI [DOI 10.1109/INMIC50486.2020.9318216, 10. 1109/inmic50486.2020.9318216, 10.1145/3392561.3394640]
[22]
Ioffe Sergey, 2015, Proceedings of Machine Learning Research, V37, P448
[23]
journals.plos, COMP MCC CEN ERROR M, DOI [10.1371/journal.pone.0041882, DOI 10.1371/JOURNAL.PONE.0041882]
[24]
Kasmi Mahdi, 2016, 2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), P82, DOI 10.1109/SETIT.2016.7939846
[25]
Lan Yushi, 2012, Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2012), P630, DOI 10.1109/CSAE.2012.6273031
[28]
Intrusion Detection Using Convolutional Neural Networks for Representation Learning
[J].
NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V,
2017, 10638
:858-866
[30]
Dynamic Network Anomaly Detection System by Using Deep Learning Techniques
[J].
CLOUD COMPUTING - CLOUD 2019,
2019, 11513
:161-176