共 50 条
- [41] Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (02): : 3395 - 3412
- [43] Comparative Analysis of Machine Learning Algorithms Based on the Outcome of Proactive Intrusion Detection System HELIX, 2020, 10 (05): : 32 - 37
- [45] An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms ACTA INFOLOGICA, 2023, 7 (01): : 125 - 138
- [47] Platform Management System Host-Based Anomaly Detection using TF-IDF and an LSTM Autoencoder MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
- [48] Intrusion detection based on Hidden Markov Model 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 3115 - 3118
- [49] Sampling method based on improved C4.5 decision tree and its application in prediction of telecom customer churn International Journal of Information Technology and Management, 2019, 18 (01): : 93 - 109
- [50] A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms SYMMETRY-BASEL, 2020, 12 (06): : 1 - 20