共 201 条
[41]
Casting out demons: Sanitizing training data for anomaly sensors
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:81-+
[45]
Divekar A, 2018, PROCEEDINGS ON 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), P1, DOI 10.1109/CCCS.2018.8586840
[46]
Dokas P., 2002, Proceeding NSF Workshop on Next Generation Data Mining, P21
[47]
Dong YT, 2019, PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), P1221, DOI [10.1109/ITAIC.2019.8785714, 10.1109/itaic.2019.8785714]
[50]
Intrusion Detection Using Big Data and Deep Learning Techniques
[J].
PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019),
2019,
:86-93