共 55 条
[31]
Lemaître G, 2017, J MACH LEARN RES, V18
[33]
A Sanitization Approach to Secure Shared Data in an IoT Environment
[J].
IEEE ACCESS,
2019, 7
:25359-25368
[36]
Malaiya RK, 2018, INT CONF COMPUT NETW, P893, DOI 10.1109/ICCNC.2018.8390278
[37]
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[38]
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
[J].
INFORMATION SECURITY JOURNAL,
2016, 25 (1-3)
:18-31
[39]
Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder
[J].
COMPUTER SECURITY - ESORICS 2017, PT II,
2017, 10493
:344-361