共 46 条
[1]
Abolhasanzadeh B., 2015, 2015 7th Conference on Information and Knowledge Technology (IKT), P1, DOI [DOI 10.1109/IKT.2015.7288799, 10.1109/IKT.2015.7288799]
[2]
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[3]
[Anonymous], 2009, P 2009 IEEE S COMP I
[4]
[Anonymous], 2017, CORR
[5]
[Anonymous], PROCEEDINGS OF THE T
[6]
[Anonymous], ICIMP 2013
[7]
Anyanwu Longy O., 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P919, DOI 10.1109/ITNG.2010.45
[8]
Chand N, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), P40, DOI 10.1109/ICACCA.2016.7578859
[9]
Cho K, 2014, P SSST EMNLP 2014 8
[10]
AN INTRUSION-DETECTION MODEL
[J].
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1987, 13 (02)
:222-232