共 141 条
- [32] Dahl GE, 2013, INT CONF ACOUST SPEE, P8609, DOI 10.1109/ICASSP.2013.6639346
- [33] Towards a taxonomy of intrusion-detection systems [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 805 - 822
- [35] AN INTRUSION-DETECTION MODEL [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
- [38] Dong B, 2016, I C COMM SOFTW NET, P581, DOI 10.1109/ICCSN.2016.7586590
- [39] Farahnakian F, 2018, INT CONF ADV COMMUN, P178, DOI 10.23919/ICACT.2018.8323688
- [40] Random Forest Modeling for Network Intrusion Detection System [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 213 - 217