共 46 条
[4]
Ambusaidi MA, 2015, 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, P295, DOI [10.1109/Trustcom-2015.387, 10.1109/Trustcom.2015.387]
[6]
[Anonymous], 2000, ACM SIGKDD EXPLORATI, DOI DOI 10.1145/846183.846201
[7]
Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:117-123
[9]
Burney SMA, 2010, INT J COMPUT SCI NET, V10, P259
[10]
Chandrasekhar A., 2013, Computer Networks Communications, P499