共 26 条
[1]
Abadi M., 2015, P 12 USENIX S OPERAT
[2]
Aksu D., 2018, INTRUSION DETECTION, P141
[3]
[Anonymous], 2018, INT J INFORM COMPUTE
[5]
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[7]
Dotcenko S, 2014, INT CONF ADV COMMUN, P167, DOI 10.1109/ICACT.2014.6778942
[8]
Faruki P., 2013, ANDROSIMILAR ROBUST, V11, P152
[10]
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
[J].
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS),
2014,
:4895-4904