共 50 条
[2]
Alippi C, 2009, IEEE IJCNN, P1537
[3]
Exploiting n-gram location for intrusion detection
[J].
2015 IEEE 27TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2015),
2015,
:1093-1098
[4]
[Anonymous], 2008, 2008 11 INT C INFORM
[5]
[Anonymous], 2016, Data mining and machine learning in cybersecurity
[6]
[Anonymous], Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003
[7]
Ansari S, 2002, IEEE POTENTIALS, V21, P17, DOI 10.1109/MP.2002.1166620
[9]
Barbara Daniel., 2001, P IEEE WORKSHOP INFO, P11