共 78 条
[21]
Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
[J].
APPLIED SCIENCES-BASEL,
2022, 12 (03)
[22]
Chowdhury MMU, 2017, 2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), P456, DOI 10.1109/UEMCON.2017.8249084
[23]
Detection and Classification of Advanced Persistent Threats and Attacks Using the Support Vector Machine
[J].
APPLIED SCIENCES-BASEL,
2019, 9 (21)
[25]
Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices
[J].
IEEE INTERNET OF THINGS JOURNAL,
2020, 7 (08)
:6882-6897
[26]
Normalized Mutual Information Feature Selection
[J].
IEEE TRANSACTIONS ON NEURAL NETWORKS,
2009, 20 (02)
:189-201
[27]
Farooq M.U., 2015, INT J COMPUT APPL, V113, P1
[29]
An Adaptive Ensemble Machine Learning Model for Intrusion Detection
[J].
IEEE ACCESS,
2019, 7
:82512-82521
[30]
Han J., 2012, Data Mining, P393, DOI [DOI 10.1016/C2009-0-61819-5, 10.1016/B978-0-12-381479-1.00009-5, DOI 10.1016/B978-0-12-381479-1.00009-5]