共 31 条
[21]
A Big Data Architecture for Large Scale Security Monitoring
[J].
2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS),
2014,
:56-63
[23]
Nguyen T.T., 2019, DEEP REINFORCEMENT L
[24]
Priya D., 2016, INT J ADV RES COMPUT, V5, P487, DOI [10.17148/UARCCE.2016.5796, DOI 10.17148/UARCCE.2016.5796]
[25]
Scherbakov M., 2015, INT J SOFT COMPUT, V10, P218, DOI [10.36478/ijscomp.2015.218.219, DOI 10.36478/IJSCOMP.2015.218.219]
[26]
Shamili Ashkan Sharifi, 2010, Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010), P4348, DOI 10.1109/ICPR.2010.1057
[27]
Shi Z. J., 2008, INT J NETW SECUR, V7, P141
[30]
YU Y., 2008, OSDI