共 16 条
[1]
Alkasassbeh M, 2016, INT J ADV COMPUT SC, V7, P436
[2]
Althubiti S., 2017, KSU C CYB ED RES PRA
[3]
[Anonymous], 2017, P 2017 4 INT C SIGNA
[5]
Web Application Attacks Detection Using Machine Learning Techniques
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA),
2018,
:1065-1072
[6]
Dogru N., 2018, LEARN TECHN C L T, DOI [10.1109/lt.2018.8368509, DOI 10.1109/LT.2018.8368509]
[7]
Epp N, 2017, ANOMALY BASED WEB AP
[8]
Ito M., 2018, IEEE 14 INT C SIGN P, DOI [10.1109/cspa.2018.8368694, DOI 10.1109/CSPA.2018.8368694]
[9]
Johari R., 2012, COMMUNICATION SYSTEM, DOI [10.1109/csnt.2012.104, DOI 10.1109/CSNT.2012.104]
[10]
Kaur G., 2018, DETECTING BLIND CROS