共 27 条
[1]
Al-Fuqaha A., 2015, IEEE COMMUNICATION S, V17, P30
[2]
Alrashdi I, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P305, DOI 10.1109/CCWC.2019.8666450
[4]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[5]
Bhayani A., 2020, ISOLATION FOREST ALG
[7]
A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios
[J].
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM),
2020,
[8]
Catricala M., 2020, 3 REASONS GARMIN RAN
[9]
Dunn J. C., 1973, Journal of Cybernetics, V3, P32, DOI 10.1080/01969727308546046
[10]
Elngar A.A., 2018, Int. J. Netw. Secur, V20, P489