共 41 条
[1]
Akpinar KO, 2020, 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), P79, DOI [10.1109/UBMK50275.2020.9219391, 10.1109/ubmk50275.2020.9219391]
[2]
Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection
[J].
IEEE ACCESS,
2019, 7
:184365-184374
[3]
Akyol F.B., 2020, Sakarya University Journal of Computer and Information Sciences, V3, P98, DOI 10.35377/saucis.03.02. 722670
[5]
Aslan M., 2020, Sak. Univ. J. Comput. Inf. Sci, DOI [10.35377/saucis.03.03.811480, DOI 10.35377/SAUCIS.03.03.811480]
[6]
Bulat P. V., 2016, Math. Educ., V11, P2949
[7]
Chu F, 2005, STUD FUZZ SOFT COMP, V177, P343
[9]
Dutta C., 2019, INT J COMPUT ENG TEC, V10, P110