共 25 条
[2]
Aickelin U, 2004, LECT NOTES COMPUT SC, V3239, P316
[4]
Anitha A. Arul, 2022, International Journal of Computer Networks and Applications, V9, P38, DOI 10.22247/ijcna/2022/211599
[5]
Barnaghi P, 2012, INT J SEMANT WEB INF, V8, P1, DOI [10.4018/jswis.201201010149, 10.4018/jswis.2012010101]
[7]
Choubisa M, 2022, 2022 INT C IOT BLOCK, P1, DOI [DOI 10.1109/ICIBT52874.2022.9807766, 10.1109/ICIBT52874.2022.9807766]
[8]
Desai MG, 2020, 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P316, DOI 10.1109/UEMCON51285.2020.9298146
[9]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217