共 22 条
[1]
Al-Debagy O, 2018, INT SYMP COMP INTELL, P149, DOI 10.1109/CINTI.2018.8928192
[2]
[Anonymous], 2013, Int. J. Comput. Appl, DOI [DOI 10.5120/13608-1412, 10.5120/13608-1412]
[3]
[Anonymous], 2012, J. Emerg. Trends Comput. Inform. Sci.
[4]
Barrett Matthew P., 2018, Framework for Improving Critical Infrastructure Cybersecurity, DOI [10.6028/NIST.CSWP.04162018, DOI 10.6028/NIST.CSWP.04162018, DOI 10.1109/JPROC.2011.2165269]
[5]
Brown S, 2020, INFOQ, P1
[6]
Cilluffo M., 2019, CYBER PHYS SECURITY
[7]
Cole E, 2002, NETWORK SECURITY BIB, V2nd
[8]
Duval A., 2019, Explainable artificial intelligence (xai), P53, DOI DOI 10.13140/RG.2.2.24722.09929
[9]
Gustavsson V., 2019, Machine learning for a network-based intrusion detection system: an application using zeek and the cicids2017 dataset
[10]
kafka, APACHE KAFKA