共 31 条
[1]
Ahir B., 2012, INDIAN J APPL RES, V2, P84
[2]
Alzahrani A. J., 2017, INTRUSION DETECTION, P309, DOI [10.1201/b21885-12, DOI 10.1201/B21885-12]
[3]
Flexible Network-based Intrusion Detection and Prevention System on Software-defined Networks
[J].
2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP),
2015,
:106-111
[4]
Ananta A. Y., 2018, J ACCOUNTING FINANCE, V18, DOI [10.33423/jaf.v18i2.398., DOI 10.33423/JAF.V18I2.398]
[5]
Ananta A. Y., 2017, SMARTICS J, V3, P31, DOI [10.21067/smartics.v3i2.1954., DOI 10.21067/SMARTICS.V3I2.1954]
[6]
[Anonymous], 2017, INT J ADV ENG RES DE, V4, DOI [10.21090/ijaerd.80591, DOI 10.21090/IJAERD.80591]
[7]
[Anonymous], 2018, IRAQI J SCI, V59, DOI 10.24996/ijs.2018.59.1b.23
[8]
Antonov M. Y., 2018, SPARK, DOI [10.1515/spark.18.5., DOI 10.1515/SPARK.18.5]
[9]
Barker S. A., 2015, COMP RING BUFFER BAS, DOI [10.2172/1225853, DOI 10.2172/1225853]
[10]
Biswas A., 2016, 5 SYST ADM NETW ENG