共 78 条
- [72] Identifying important features for intrusion detection using support vector machines and neural networks [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2003, : 209 - 216
- [73] Turton W., Hackers breached colonial pipeline using compromised password
- [74] Ukil A., P 2011 2 NAT C EM TR
- [75] Ullah I., 2020, SCHEME GENERATING DA
- [77] A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM [J]. IEEE ACCESS, 2021, 9 : 138432 - 138450
- [78] Witten IH, 2011, MOR KAUF D, P1