共 128 条
[81]
Pihelgas M., 2012, COMP ANAL OPEN SOURC
[82]
SVELTE: Real-time intrusion detection in the Internet of Things
[J].
AD HOC NETWORKS,
2013, 11 (08)
:2661-2674
[83]
A survey of network-based intrusion detection data sets
[J].
COMPUTERS & SECURITY,
2019, 86
:147-167
[84]
Sainis N., 2018, INT J APPL ENG RES, V13, P7249
[85]
Min-max hyperellipsoidal clustering for anomaly detection in network security
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS,
2006, 36 (04)
:887-901
[86]
Shah A. A., 2020, VAWKUM T COMPUT SCI, V8, P48, DOI DOI 10.21015/VTCS.V15I3.528
[87]
Performance comparison of intrusion detection systems and application of machine learning to Snort system
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 80
:157-170
[88]
Shanmugam B, 2009, 2009 INTERNATIONAL CONFERENCE OF SOFT COMPUTING AND PATTERN RECOGNITION, P212, DOI 10.1109/SoCPaR.2009.51
[89]
Shi Y, 2011, ADV INFORM KNOWL PRO, P3, DOI 10.1007/978-0-85729-504-0_1