共 8 条
[1]
Al-Saedi K.H., 2012, International Journal of Computer Applications, V975, P8887
[2]
Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems
[J].
2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD),
2013,
:69-76
[3]
Ding Z., 2013, IFAC P, V46, P12, DOI [DOI 10.3182/20130902-3-CN-3020.00044, 10.3182/20130902-3-cn-3020.00044]
[4]
Hassan W. U., 2019, NETW DISTR SYST SEC
[5]
Isolation Forest
[J].
ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS,
2008,
:413-+
[6]
McElwee S, 2017, IEEE MILIT COMMUN C, P1, DOI 10.1109/MILCOM.2017.8170757
[7]
Sapegin A, 2013, INT C INFORM ASSUR S, P25, DOI 10.1109/ISIAS.2013.6947748
[8]
Wattenberg M., 2016, Distill, V1, DOI [10.23915/distill.00002, DOI 10.23915/DISTILL.00002]