共 34 条
[1]
Ahmad K.A., 2018, INT J COMPUT SCI INF, V10, P48, DOI [10.30880/ijie.2018.10.09.025, DOI 10.30880/IJIE.2018.10.09.025]
[2]
A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms
[J].
SYMMETRY-BASEL,
2020, 12 (06)
:1-20
[3]
[Anonymous], JOURNAL OF COMPUTING, DOI DOI 10.20532/CIT.2016.1002701
[4]
Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:117-123
[5]
Biswas S., 2018, International Journal of Pure and Applied Mathematics, V118, P101
[6]
Broomhead D. S., 1988, Complex Systems, V2, P321
[7]
Chand N, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), P40, DOI 10.1109/ICACCA.2016.7578859
[8]
Choudhury S, 2015, 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), P89, DOI 10.1109/ICSTM.2015.7225395
[10]
Dhanabal L, 2015, Int J Adv Res Comput Commun Eng, V4, P446, DOI DOI 10.17148/IJARCCE.2015.4696