共 25 条
[1]
Ahmed A, 2019, J CYBERSECURITY INFO, P44, DOI [10.54216/JCIM.000104, DOI 10.54216/JCIM.000104]
[2]
Amal F., 2021, American Journal of Business and Operations Research, V2, P24, DOI 10.54216/AJBOR.020103
[5]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[7]
Dang Y., 2017, J INNER MONGOLIA U T
[8]
Fang L.I., 2017, J BEIJING U CHEM TEC
[9]
Gao Z., 2017, J TEXTILE RES
[10]
Hadoop, MapReduce and HDFS: A Developers Perspective
[J].
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015),
2015, 48
:45-50