共 28 条
[2]
Amin M. Z., 2017, TECH REP, P1, DOI [10.13140/RG.2.2.26371.25127, DOI 10.13140/RG.2.2.26371.25127]
[3]
Bandura L., 2018, SEG technical program expanded abstracts, DOI [10.1190/segam2018-2997015.1, DOI 10.1190/SEGAM2018-2997015.1]
[4]
Bazazeh D., 2016, 2016 5 INT C EL DEV, P1, DOI [DOI 10.1109/ICEDSA.2016.7818560, 10.1109/BIOSMART.2016.7835465, DOI 10.1109/BIOSMART.2016.7835465]
[5]
Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:117-123
[6]
Brandusoiu I., 2013, Margin, V1, px1, DOI 10.15660/AUOFMTE.2013-1.2772
[7]
Dalmia Hemlata, 2020, Innovations in Electronics and Communication Engineering. Proceedings of the 8th ICIECE 2019. Lecture Notes in Networks and Systems (LNNS 107), P681, DOI 10.1007/978-981-15-3172-9_64
[10]
Guedrez R, 2016, 15TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (IEEE NCA 2016), P113, DOI 10.1109/NCA.2016.7778603