共 10 条
[1]
Alrashdi I, 2019, 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P515, DOI [10.1109/uemcon47517.2019.8992963, 10.1109/UEMCON47517.2019.8992963]
[2]
[Anonymous], 2017, P 2017 4 INT C SIGNA
[3]
Bhatt P, 2017, IEEE GLOB HUMANIT C, P81
[4]
Network intrusion detection based on random forest and support vector machine
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1,
2017,
:635-638
[7]
Panchal AC, 2018, IEEE GLOB CONF WIREL, P124, DOI 10.1109/GCWCN.2018.8668630
[9]
Ramli MR, 2019, IEEE INT C EMERG, P1661, DOI [10.1109/etfa.2019.8869402, 10.1109/ETFA.2019.8869402]