共 108 条
[1]
Aliero MS(2020)An algorithm for detecting SQL injection vulnerability using black-box testing J Ambient Intell Humaniz Comput 11 249-266
[2]
Ghani I(2020)Systematic review analysis on SQLIA detection and prevention approaches Wirel Pers Commun 112 2297-2333
[3]
Qureshi KN(2013)Internet of things (IoT): a vision, architectural elements, and future directions Fut. Gener. Comput. Syst. 29 1645-1660
[4]
Rohani MFA(2015)A survey of data mining and machine learning methods for cyber security intrusion detection IEEE Commun. Surv. Tutor. 18 1153-1176
[5]
Aliero MS(1984)A note on denial-of-service in operating systems IEEE Trans. Softw. Eng. 3 320-324
[6]
Qureshi KN(2004)A taxonomy of DDoS attack and DDoS defense mechanisms ACM SIGCOMM Comput. Commun. Rev. 34 39-53
[7]
Pasha MF(2009)Anomaly-based network intrusion detection: techniques, systems and challenges Comput Secur 28 18-28
[8]
Ghani I(2016)Support vector machines Stata J. 16 917-937
[9]
Yauri RA(2016)Comparative study of K-NN, naive Bayes and decision tree classification techniques Int. J. Sci. Res. (IJSR) 5 1842-1845
[10]
Gubbi J(1992)Multilayer perceptron, fuzzy sets, and classification IEEE Trans. Neural Netw. 3 683-697