共 32 条
[1]
[Anonymous], 1976, Communication and Cybernetics
[2]
[Anonymous], 2014, NOVICE INSIGHTS
[3]
[Anonymous], 2011, Spectral Audio Signal Processing
[4]
Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:117-123
[5]
Biernacki P, 2014, 2014 19TH INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN AUTOMATION AND ROBOTICS (MMAR), P711, DOI 10.1109/MMAR.2014.6957441
[8]
Breinman L., RANDOM FORESTS STAT
[10]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217