共 25 条
[2]
Bhatia S, 2016, PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), P958, DOI 10.1109/FTC.2016.7821720
[3]
Bhuyan M.H., 2015, PATTERN RECOGNITION, V51
[5]
Cappers B.C.M., 2015, VIS CYB SEC VIZSEC 2, P1, DOI DOI 10.1109/VIZSEC.2015.7312768
[6]
Catak F.O., 2017, 5 HIGH PERF COMP C, P1
[7]
Deshpande P, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P632, DOI 10.1109/CCAA.2015.7148450
[8]
Distributed attack detection scheme using deep learning approach for Internet of Things
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 82
:761-768
[10]
Feinstein L, 2003, DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, P303, DOI 10.1109/DISCEX.2003.1194894