共 78 条
[51]
Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split
[J].
SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016,
2016, 625
:427-438
[52]
Rai Kajal, 2016, International Journal of Advanced Networking and Applications, V7, P2828
[53]
Rao B.B., 2017, INDIAN J SCI TECHNOL, V10, P1, DOI DOI 10.17485/ijst/2017/v10i14/93690
[54]
Relan NG, 2015, P INT C NASC TECHN E, P1, DOI DOI 10.1109/ICNTE.2015.7029925
[55]
Revathi S., 2013, Int. J. Eng. Res. Technol. (IJERT), V2, P1848
[56]
Sahoo DoyenChenghao Liu Steven CH Hoi., 2017, MALICIOUS URL DETECT
[57]
Saxena H., 2014, Int. J. Comput. Appl., V98, P25, DOI [10.5120/17188-7369, DOI 10.5120/17188-7369]
[58]
An Intelligent Intrusion Detection System Using Average Manhattan Distance-based Decision Tree
[J].
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1,
2015, 324
:205-212
[59]
Shapoorifard H., 2017, Int. J. Comput. Appl., V173, P5, DOI [10.5120/ijca2017914340, DOI 10.5120/IJCA2017914340]
[60]
Sharifi S.A.K. A. M., 2015, Journal of Convergence Information Technology, V10, P42