共 7 条
[1]
Alhaidari Sulaiman., 2018, Jordanian Journal of Computers and Information Technology JJCIT, V4, P175
[2]
Alhaidari Sulaiman, 2018, INT J COMPUTER SCI I, V15, P12300
[3]
Alharbi A, 2018, INT J COMPUTER INFOR
[4]
Chandola V., 2012, IEEE T KNOWLEDGE DAT, V24
[5]
Joshi S. S., 2005, P 43 ACM SE C KENN G
[6]
Anomaly intrusion detection method based on HMM
[J].
ELECTRONICS LETTERS,
2002, 38 (13)
:663-664
[7]
Zang X., 2003, P 4 INT C PAR DISTR