共 20 条
- [1] Deep Learning for Malicious Flow Detection [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
- [2] WEDL-NIDS: Improving Network Intrusion Detection Using Word Embedding-Based Deep Learning Method [J]. MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE (MDAI 2018), 2018, 11144 : 283 - 295
- [3] Fu R, 2016, 2016 31ST YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), P324, DOI 10.1109/YAC.2016.7804912
- [4] Goldberg Y., 2013, ARXIV14023722
- [5] Detecting IoT Malicious Traffic based on Autoencoder and Convolutional Neural Network [J]. 2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
- [6] Javaid A., 2016, P 9 EAI INT C BIOINS, V3, P2, DOI [DOI 10.4108/EAI.3-12-2015.2262516, 10.4108/eai.3-12-2015.2262516]
- [7] A flow-based method for abnormal network traffic detection [J]. NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 599 - 612
- [9] McDermott CD, 2018, IEEE IJCNN