共 60 条
[41]
Intrusion Detection in the Cloud
[J].
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS,
2009,
:729-734
[42]
Sak H, 2014, Arxiv, DOI [arXiv:1402.1128, DOI 10.48550/ARXIV.1402.1128, 10.48550/arXiv.1402.1128]
[43]
Chronos: DDoS Attack Detection Using Time-Based Autoencoder
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2022, 19 (01)
:627-641
[45]
Sharafaldin I, 2019, INT CARN CONF SECU
[46]
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
[J].
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2018,
:108-116
[47]
Anomaly Detection in Streams with Extreme Value Theory
[J].
KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2017,
:1067-1075
[48]
A Statistical Technique for Online Anomaly Detection for Big Data Streams in Cloud Collaborative Environment
[J].
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT),
2016,
:108-111
[49]
Solaimani M, 2014, IEEE INT CONF BIG DA, P1086, DOI 10.1109/BigData.2014.7004343
[50]
Sutskever I, 2014, ADV NEUR IN, V27