Cyberattack Classificator Verification
暂无分享,去创建一个
[1] Igor Korobiichuk,et al. How to Increase Efficiency of Automatic Control of Complex Plants by Development and Implementation of Coordination Control System , 2016, ICONS 2016.
[2] 日本規格協会. 情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001 , 2005 .
[3] Володимир Леонідович Бурячок,et al. Construction method of cyber attacks classifier on government information resources , 2015 .
[4] Yuriy Syerov,et al. Methods of Determining Information Support of Web Community User Personal Data Verification System , 2017, AUTOMATION.
[5] Amit Kumar Dewangan,et al. An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set , 2014 .
[6] Gary B. Wills,et al. Application of Bagging, Boosting and Stacking to Intrusion Detection , 2012, MLDM.
[7] Deokjai Choi,et al. Application of Data Mining to Network Intrusion Detection: Classifier Selection Model , 2008, APNOMS.
[8] Dewan Md. Farid,et al. Application of Machine Learning Approaches in Intrusion Detection System: A Survey , 2015 .