共 15 条
[1]
Abhaya, 2014, DATA MINING TECHNIQU, V3, P6938
[2]
Akshaya P., 2016, IJECS, V05
[3]
Ayman, 2014, IJETT, V9, P501
[4]
Ben-Gal I., 2007, ENCY STAT QUALITY RE, P1, DOI [10.1002/9780470061572.eqr089, DOI 10.1002/9780470061572.EQR089]
[5]
cemeric Alma, 2008, PROD SEKE2008, P1
[6]
Deepika, 2012, IJESIT, V1, P54
[7]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217
[8]
Jabbar M. A., 2016, SOCPAR2016, P490
[9]
Jabbar M. A., 2016, IEEE I4C2016
[10]
Jabbar M.A., 2017, Proceedings of the 9th International Conference on Machine Learning and Computing, P253