共 30 条
[1]
Benaddi Hafsa, 2020, Wireless Internet. 12th EAI International Conference, WiCON 2019. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 317), P73, DOI 10.1007/978-3-030-52988-8_7
[3]
Erdodi L, 2020, ARXIV PREPRINT ARXIV
[4]
Fraze D., 2016, Cyber grand challenge (CGC)
[6]
Detection of SQL Injection Attacks: A Machine Learning Approach
[J].
2019 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA),
2019,
[7]
A Deep Reinforcement Learning Approach for Anomaly Network Intrusion Detection System
[J].
2020 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET),
2020,
[8]
Joshi A, 2014, 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), P1111, DOI 10.1109/ICCICCT.2014.6993127