共 37 条
[31]
Roesch M, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), P229
[32]
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
[J].
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2018,
:108-116
[33]
Stein G., 2005, P 43 ANN SE REG C, V2, P136, DOI DOI 10.1145/1167253.1167288
[34]
Suri R., 2019, OUTLIER DETECTION TE
[35]
Sutton RS, 2018, ADAPT COMPUT MACH LE, P1
[36]
Large-Scale and Robust Intrusion Detection Model Combining Improved Deep Belief Network With Feature-Weighted SVM
[J].
IEEE ACCESS,
2020, 8 (08)
:98600-98611
[37]
Xu X, 2005, LECT NOTES ARTIF INT, V3584, P696