共 188 条
- [91] Ma J, 2009, KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, P1245
- [92] On Security Issues in Web Applications through Cross Site Scripting (XSS) [J]. 2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1, 2013, : 583 - 588
- [93] Mamadhan S, 2012, INT CONF INTELL SYST, P240, DOI 10.1109/ISDA.2012.6416544
- [94] Application of deep learning to cybersecurity: A survey [J]. NEUROCOMPUTING, 2019, 347 : 149 - 176
- [95] Manjusha R., 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT 2011), P1043, DOI 10.1109/ICRTIT.2011.5972310
- [96] Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2595 - 2621
- [97] Mao ZQ, 2009, LECT NOTES COMPUT SC, V5628, P238
- [98] Marashdih AW, 2016, INT J ADV COMPUT SC, V7, P155
- [99] Stacked Convolutional Auto-Encoders for Hierarchical Feature Extraction [J]. ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2011, PT I, 2011, 6791 : 52 - 59
- [100] Feature Selection Algorithms in Intrusion Detection System: A Survey [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (10): : 5079 - 5099