共 94 条
[81]
Wlazlo P., 2019, Proceedings of the 2019 Principles, Systems and Applications of IP Telecommunications (IPTComm), P1, DOI 10.1109/IPTCOMM.2019.8921260
[83]
Using Bayesian Networks for Cyber Security Analysis
[J].
2010 IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS DSN,
2010,
:211-220
[84]
Yan J, 2016, IEEE IJCNN, P1395, DOI 10.1109/IJCNN.2016.7727361
[85]
Yang A., 2018, 2018 IEEE GLOBAL COM, V2018, P1, DOI [10.1109/GLOCOM.2018.8648131, DOI 10.1109/GLOCOM.2018.8648131]
[86]
Yang P., 2013, Proceedings of the 23rd International Joint Conference on Artificial Intelligence, P1848
[88]
Yu Zheng, 2015, IEEE Transactions on Big Data, V1, P16, DOI 10.1109/TBDATA.2015.2465959
[89]
Zadeh L.A., 1986, AI Mag., V7, P85, DOI 10.1609/aimag.v7i2.542
[90]
Random-forests-based network intrusion detection systems
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2008, 38 (05)
:649-659