共 188 条
- [103] Mei JJ, 2009, PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, P1411, DOI 10.1109/ITNG.2009.34
- [104] Meneely A, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P453
- [105] Mingyi Zhu, 2018, Network and Parallel Computing. 15th IFIP WG 10.3 International Conference, NPC 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11276), P137, DOI 10.1007/978-3-030-05677-3_13
- [106] A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 686 - 728
- [107] Mittal S., 2019, arXiv
- [108] Deep Learning for IoT Big Data and Streaming Analytics: A Survey [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2923 - 2960
- [109] Mohammed I.A, 2020, ARTIF INTELL-AMST, V7
- [110] Moosa A., 2010, INT J COMPUT INF ENG, V4, P610