共 16 条
[1]
[Anonymous], IEEE S COMP INT SEC
[2]
[Anonymous], 1785, SEARCH UNB
[3]
[Anonymous], 2015, South African Computer Journal, DOI DOI 10.18489/SACJ.V56I1.248
[4]
[Anonymous], NETWORK INTRUSION DE
[5]
[Anonymous], 2016, KDD16 P 22 ACM, DOI DOI 10.1145/2939672.2939785
[6]
Buczak Anna L., 2017, INT J RECENT TRENDS, V3, P109
[7]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217
[9]
Li Fan, 2010, 2010 INT C MULT TECH, P597
[10]
Intrusion Detection Using Convolutional Neural Networks for Representation Learning
[J].
NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V,
2017, 10638
:858-866