共 164 条
[22]
Biswas Kamanshis., 2007, Security Threats in Mobile Ad Hoc Network
[24]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[26]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[27]
Chandrasekhar A. M., 2014, 2014 International Conference on Communications and Signal Processing (ICCSP), P672, DOI 10.1109/ICCSP.2014.6949927
[29]
Dalal Kushal Rashmikant., 2020, P IEEE INT C EL SUST, P75
[30]
Daniya T., 2021, Mater. Today Proc., V3, P1, DOI [10.1016/j.matpr.2021.03.353, DOI 10.1016/J.MATPR.2021.03.353]