共 18 条
[1]
[Anonymous], 2015, INT C COMP COMM INF, DOI DOI 10.1109/ICCCI.2015.7218109
[2]
[Anonymous], 2015, Journal of Big Data, DOI DOI 10.1186/S40537-015-0013-4
[3]
[Anonymous], 2016, P KOR ADV I SCI TECH
[4]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[5]
Cui G.C., 2014, APPL MECH MAT, V631-632, P946
[6]
Mining network data for intrusion detection through combining SVMs with ant colony networks
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2014, 37
:127-140
[8]
Hosseini B.S.M., 2015, PROCEDIA COMPUTER SC, V55
[9]
Jiang Lan, 2014, Advanced Materials Research, V1044-1045, P965, DOI 10.4028/www.scientific.net/AMR.1044-1045.965