共 21 条
[1]
Protocol analysis in intrusion detection using decision tree
[J].
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS,
2004,
:404-408
[2]
Antonatos S., 2004, Software Engineering Notes, V29, P207, DOI 10.1145/974043.974078
[4]
Distributed attack detection scheme using deep learning approach for Internet of Things
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 82
:761-768
[5]
Adapted K-Nearest Neighbors for Detecting Anomalies on Spatio-Temporal Traffic Flow
[J].
IEEE ACCESS,
2019, 7
:10015-10027
[6]
Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks
[J].
2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017),
2017,
:140-145
[7]
Jones A, 2014, IEEE DECIS CONTR P, P848, DOI 10.1109/CDC.2014.7039487
[10]
Kosek Anna Magdalena, 2016, IEEE P 2016 JOINT WO