共 20 条
[1]
Deep Learning for Malicious Flow Detection
[J].
2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC),
2017,
[2]
WEDL-NIDS: Improving Network Intrusion Detection Using Word Embedding-Based Deep Learning Method
[J].
MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE (MDAI 2018),
2018, 11144
:283-295
[3]
Fu R, 2016, 2016 31ST YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), P324, DOI 10.1109/YAC.2016.7804912
[4]
Goldberg Y., 2013, ARXIV14023722
[5]
Detecting IoT Malicious Traffic based on Autoencoder and Convolutional Neural Network
[J].
2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS),
2019,
[6]
Javaid A., 2016, P 9 EAI INT C BIOINS, V3, P2, DOI [DOI 10.4108/EAI.3-12-2015.2262516, 10.4108/eai.3-12-2015.2262516]
[7]
A flow-based method for abnormal network traffic detection
[J].
NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES,
2004,
:599-612
[9]
McDermott CD, 2018, IEEE IJCNN