共 141 条
[31]
Dahl GE, 2013, INT CONF ACOUST SPEE, P8609, DOI 10.1109/ICASSP.2013.6639346
[32]
Towards a taxonomy of intrusion-detection systems
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
1999, 31 (08)
:805-822
[34]
AN INTRUSION-DETECTION MODEL
[J].
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1987, 13 (02)
:222-232
[37]
Dong B, 2016, I C COMM SOFTW NET, P581, DOI 10.1109/ICCSN.2016.7586590
[38]
Farahnakian F, 2018, INT CONF ADV COMMUN, P178, DOI 10.23919/ICACT.2018.8323688
[39]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217
[40]
An Adaptive Ensemble Machine Learning Model for Intrusion Detection
[J].
IEEE ACCESS,
2019, 7
:82512-82521