共 23 条
[1]
[Anonymous], 2008, International Journal of computational Intelligence
[2]
[Anonymous], RBC
[3]
Branitsky A., 2016, T SPIIRAN, V2, P207, DOI [10.15622/sp.45, DOI 10.15622/SP.45]
[4]
CISCO, CISCO 2018 ANN CYB R
[6]
Kornienko A. A., INTRUSION DETECTION
[7]
Kotov V. D., 2009, MAT DOKL VSER NAUCHN, P371
[8]
Krasnopevtsev A.A., 2013, BEZOPASNOST INFORM T, V20, P63
[9]
Meshcheryakov R. V., 2013, TEKHNICHESKIE NAUKI, P57
[10]
Mukkamala S., MODELING INTRUSION D