共 32 条
[1]
Abd Jalil K, 2010, INT CONF NETWORK INF, P221, DOI 10.1109/ICNIT.2010.5508526
[4]
[Anonymous], 2018, The UNSW-NB15 dataset description
[5]
[Anonymous], 2021, IEEE Trans. Broadcast.
[6]
Bilge L., 2012, P 2012 ACM C COMP CO, P833, DOI DOI 10.1145/2382196.2382284
[7]
A Comparative Study of Classification Techniques for Intrusion Detection
[J].
2013 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI),
2013,
:40-43
[8]
CHEONG YUN GYUNG, 2017, [Journal of The Korea Institute of Information Security and Cryptology, 정보보호학회논문지], V27, P1385, DOI 10.13089/JKIISC.2017.27.6.1385
[9]
Ektefa Mohammadreza, 2010, Proceedings of the 2010 International Conference on Information Retrieval and Knowledge Management (CAMP 2010), P200, DOI 10.1109/INFRKM.2010.5466919
[10]
Ertam F., 2017, International Artificial Intelligence and Data Processing Symposium (IDAP), P1