共 41 条
[1]
Cyber-Attack Modeling Analysis Techniques: An Overview
[J].
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW),
2016,
:69-76
[2]
[Anonymous], 2011, LEADING ISSUES INFOR
[3]
Argyriou A., 2008, Advances in Neural Information Processing Systems, P25
[4]
Benyacoub B., 2013, P ACS INT C COMP SYS, P1
[5]
Brownlee J., 2017, A gentle introduction to transfer learning for deep learning
[6]
Canadian Institute for Cybersecurity, CSE CIC IDS2018 AWS
[7]
Contemporary Sequential Network Attacks Prediction using Hidden Markov Model
[J].
2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST),
2019,
:333-335
[8]
Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 108 (108)
:636-649
[9]
CISCO & Affliates, SNORT NETW INTR DET
[10]
Cummings J.J., PULLEDPORK