共 11 条
[1]
Chan APF, 2004, PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P4252
[2]
Isaza G. A., 2012, VECTOR, P69
[3]
Isaza G.A., 2010, J INFOR ASSURANCE SE, V5, P376
[4]
Kacha C., 2012, INT J EMERGING TECHN, V2, P243
[5]
Kartalopoulos S.V., 1996, Understanding Neural Networks and Fuzzy Logic: Basic Concepts and Applications
[6]
Keizer G., 2014, GARDEN VARIETY DDOS
[7]
Liu WT, 2008, PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P1400, DOI 10.1109/ICMLC.2008.4620624
[8]
Mukkamala S, 2003, IEEE INT CONF FUZZY, P1231
[9]
Saied A, 2014, COMM COM INF SC, V430, P309
[10]
Machine learning for automatic defence against Distributed Denial of Service attacks
[J].
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14,
2007,
:1217-1222