相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT
Jianhua Li et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)
A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things
Prosanta Gope et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)
Secure Device-to-Device communications for 5G enabled Internet of Things applications
Gurjot Singh Gaba et al.
COMPUTER COMMUNICATIONS (2021)
Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0
Gurjot Singh Gaba et al.
IEEE ACCESS (2020)
An in-depth experimental study of anomaly detection using gradient boosted machine
Bayu Adhi Tama et al.
NEURAL COMPUTING & APPLICATIONS (2019)
LR-HIDS: logistic regression host-based intrusion detection system for cloud environments
Elham Besharati et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
Ensemble learning: A survey
Omer Sagi et al.
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2018)
Ensemble learning for data stream analysis: A survey
Bartosz Krawczyk et al.
INFORMATION FUSION (2017)
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
Wei-Chao Lin et al.
KNOWLEDGE-BASED SYSTEMS (2015)
Intrusion Detection System Using Bagging with Partial Decision TreeBase Classifier
D. P. Gaikwad et al.
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15) (2015)
Intrusion detection system: A comprehensive review
Hung-Jen Liao et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
A survey of intrusion detection techniques in Cloud
Chirag Modi et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
Machine learning and soft computing for ICT security: an overview of current trends
Francesco Camastra et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2013)
A Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and Hybrid-Based Approaches
Mikel Galar et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2012)
The cyber threat landscape: Challenges and future research directions
Kim-Kwang Raymond Choo
COMPUTERS & SECURITY (2011)
Performance comparison of machine learning algorithms and number of independent components used in fMRI decoding of belief vs. disbelief
P. K. Douglas et al.
NEUROIMAGE (2011)
Sensitivity Analysis of k-Fold Cross Validation in Prediction Error Estimation
Juan Diego Rodriguez et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2010)
Greedy function approximation: A gradient boosting machine
JH Friedman
ANNALS OF STATISTICS (2001)