共 9 条
[2]
Cannady J., 1998, NA TIONAL INFORM SYS, V26
[3]
Kumari VV, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P481, DOI 10.1109/I-SMAC.2017.8058397
[4]
An Empirical Study on Network Anomaly Detection using Convolutional Neural Networks
[J].
2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS),
2018,
:1595-1598
[5]
Li Z., 2017, ICONIP
[6]
Spectral Clustering Technique for Classifying Network Attacks
[J].
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS),
2016,
:406-411
[7]
Moradi M., 2004, IEEE INT C ADV INTEL
[8]
Vinayakumar R, 2017, 2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2353, DOI 10.1109/ICACCI.2017.8126198