共 17 条
- [1] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
- [3] El-Sherif S M, 2019, ARCHITECTURES DETECT, P1
- [4] Ghosh A, 2019, MAX AFFINE REGRESSIO
- [6] Intrusion signature creation via clustering anomalies [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
- [7] Joshi S., 2005, Proceedings of the 43rd annual Southeast regional conference-Volume, P98
- [8] Kebande V R, 2019, WILEY INTERDIPLINARY, V1
- [9] Bayesian event classification for intrusion detection [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 14 - 23
- [10] Livadas C, 2006, CONF LOCAL COMPUT NE, P967