共 20 条
[1]
[Anonymous], IDS 2018 DATASETS RE
[2]
[Anonymous], KDD CUP 1999 DAT
[3]
Atefinia R., 2021, J SUPER COMPUTING, V77
[4]
Basnet R., 2019, DETECTING CLASSIFYIN
[5]
Exploratory Data Analysis of a Unified Host and Network Dataset
[J].
2019 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS),
2019,
:136-140
[6]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[7]
Fitni Qusyairi Ridho Saeful, 2020, 2020 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT). Proceedings, P118, DOI 10.1109/IAICT50021.2020.9172014
[8]
James G., 1997, Tech. Rep
[9]
A Survey on Anomaly Based Host Intrusion Detection System
[J].
PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18),
2018, 1000
[10]
Kent A. D., 2015, Dynamic Networks in Cybersecurity