共 94 条
[1]
Protocol analysis in intrusion detection using decision tree
[J].
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS,
2004,
:404-408
[4]
[Anonymous], 2018, P IEEE POW EN SOC GE
[5]
[Anonymous], 2013, P 43 ANN IEEE IFIP C
[6]
[Anonymous], 2017, CAN C EL COMP ENG
[7]
[Anonymous], 2005, SNORT COOKBOOK
[8]
[Anonymous], 2012, CRISIS 2012
[10]
An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications
[J].
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2,
2013,
:54-59