共 22 条
[1]
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[3]
Hall M., 2009, SIGKDD EXPLORATIONS, V11, DOI [10.1145/1656274.1656278, DOI 10.1145/1656274.1656278]
[4]
Heberlein L. T., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P296, DOI 10.1109/RISP.1990.63859
[5]
Ioulianou P., 2018, Information and Communication Technology Form
[6]
Toward a Lightweight Intrusion Detection System for the Internet of Things
[J].
IEEE ACCESS,
2019, 7
:42450-42471
[7]
Kavitha P., 2014, INT J COMPUTER TREND, V12, P227, DOI [10.14445/22312803/IJCTT-V12P146, DOI 10.14445/22312803/IJCTT-V12P146]