共 28 条
[1]
Performance Analysis of Anomaly Based Network Intrusion Detection Systems
[J].
PROCEEDINGS OF THE 2018 43RD ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS),
2018,
:1-7
[2]
Agrawal S, 2021, Arxiv, DOI [arXiv:2106.09527, DOI 10.48550/ARXIV.2106.09527]
[5]
Bace R., 2001, Technical Report 800-31
[6]
Breiman L., 2001, MACH LEARN, V45, P4150
[7]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[9]
DFedForest: Decentralized Federated Forest
[J].
2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020),
2020,
:90-97
[10]
Random Forest Modeling for Network Intrusion Detection System
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:213-217