共 27 条
- [1] [Anonymous], 2012, NETW FUNCT VIRT
- [2] Experience Report: Log Mining using Natural Language Processing and Application to Anomaly Detection [J]. 2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 351 - 360
- [3] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
- [5] Cui Z., 2016, MULTISCALE CONVOLUTI
- [9] Gulenko A, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), P2716, DOI 10.1109/BigData.2016.7840917
- [10] A system architecture for real-time anomaly detection in large-scale NFV systems [J]. 11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 491 - 496