共 33 条
[11]
Chitrakar R, 2012, INT C WIREL COMM NET
[12]
Foley S., 2018, SEX DRUGS BITCOIN MU, P1
[13]
Haq NF, 2015, 2015 SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), P989, DOI 10.1109/IntelliSys.2015.7361264
[14]
Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm
[J].
2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013),
2013,
:76-81
[15]
Jyothsna V., 2011, International Journal of Computer Applications, V28, P26
[16]
Kibirige G., 2015, Int J Comput Sci Inf Secur, V13, P1
[18]
Krishnan R., 2016, INT J PHARM TECHNOLO, P23139
[19]
Kumar R, 2016, INT CONF IND INF SYS, P1, DOI 10.1109/ICIINFS.2016.8262896
[20]
Lin Y., 2015, RES ARTICLE SECURITY, V8, P1