共 27 条
[2]
[Anonymous], 2002, ICML
[4]
Bahaa-Eldin A. M., 2011, Proceedings of the 2011 International Conference on Computer Engineering & Systems (ICCES 2011), P64, DOI 10.1109/ICCES.2011.6141013
[5]
Bekerman D, 2015, IEEE CONF COMM NETW, P134, DOI 10.1109/CNS.2015.7346821
[6]
Performance evaluation of intrusion detection based on machine learning using Apache Spark
[J].
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017),
2018, 127
:1-6
[7]
El-Maghraby RT, 2017, 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), P188, DOI 10.1109/ICCES.2017.8275301
[8]
Felder R. M., 2009, ASQ Higher Education Brief, V2, P1, DOI DOI 10.4324/9780203891414-15
[9]
Hao Zhang, 2020, 2020 International Conference on Pervasive Artificial Intelligence (ICPAI), P35, DOI 10.1109/ICPAI51961.2020.00014
[10]
Javaid A, 2016, Eai Endorsed Transactions on Security and Safety, V3, P2