共 48 条
- [1] Al-Hawawreh M., Sitnikova E., Aboutorab N., X-IIoTID: a connectivity-and device-agnostic intrusion dataset for industrial internet of things, IEEE Internet Things J, (2021)
- [2] Breiman L., Bagging predictors, Mach Learn, 24, 2, pp. 123-140, (1996)
- [3] Breiman L.E.O., Random forests, Mach Learn, pp. 5-32, (2001)
- [4] Chang J.F., Chu S.C., Roddick J.F., Pan J.S., A parallel particle swarm optimization algorithm with communication strategies, J Inf Sci Eng, 21, 4, pp. 809-818, (2005)
- [5] Chen T.Y., Chi T.M., On the improvements of the particle swarm optimization algorithm, Adv Eng Softw, 41, 2, pp. 229-239, (2010)
- [6] Chu S.-C., Tsai P., Pan J.-S., Cat swarm optimization, Pacific Rim Int Conf Artif Intell, pp. 854-858, (2006)
- [7] Dhanabal L., Shantharajah S.P., A study on NSL-KDD dataset for intrusion detection system based on classification algorithms, Int J Adv Res Comput Commun Eng, 4, 6, pp. 446-452, (2015)
- [8] Fang X., Misra S., Xue G., Yang D., Smart grid—the new and improved power grid: a survey, IEEE Commun Surv Tutorials, 14, 4, pp. 944-980, (2012)
- [9] Gates G.W., The reduced nearest neighbor rule, IEEE Trans Inf Theory, 18, 3, pp. 431-433, (1972)
- [10] Glover F., Tabu Search, (1998)