参考文献
[1]霍沫霖, 郭磊, 张哲. 区域能源互联网的发展现状与政策建议[J]. 中国电力, 2020, 53(12): 241247[2]化存卿. 物联网安全检测与防护机制综述[J]. 上海交通大学学报, 2018, 52(10): 13071313[3]肖政宏, 尹浩. 基于网络流量统计分析的入侵检测研究[J]. 微电子学与计算机, 2006 (5): 7678[4]Frost V S, Melamed B. Traffic modeling for telecommunications networks[J]. IEEE Communications Magazine, 1994, 32(3): 7081[5]Garcia R C, Sadiku M N O, Cannady J D. Waid: Wavelet analysis intrusion detection[C] Proc of the 45th Midwest Symp on Circuits and Systems (MWSCAS2002). 2002: 688691[6]Li Ming, Jia Weijia, Zhao Wei. Decision analysis of networkbased intrusion detection systems for denialofserviceattacks[C] Proc of 2001 Int Conf on InfoTech and InfoNet (ICII 2001). 2001: 16[7]Moore A W, Zuev D. Internet traffic classification using bayesian analysis techniques[J]. Performance Evaluation Review, 2005, 33(1): 5060[8]Shafiq M, Yu X, Wang D. Network traffic classification using machine learning algorithms[C] Proc of Int Conf on Intelligent and Interactive Systems and Applications. Berlin: Springer, 2017: 621627[9]李根. 基于可信计算的入侵检测技术研究[D]. 南京: 南京邮电大学, 2012[10]Ghosh D, Cabrera J. Enriched random forest for high dimensional genomic data[J]. IEEEACM Trans on Computational Biology and Bioinformatics, 2022, 19(5): 28172828[11]Désir C, Petitjean C, Heutte L, et al. Classification of endomicroscopic images of the lung based on random subwindows and extratrees[J]. IEEE Trans on Biomedical Engineering, 2012, 59(9): 26772683[12]Ilya T, Neil H, Alexander K, et al. MLPMixer: An allMLP architecture for vision[OL]. 2021 [20221017]. https:arxiv.orgabs2108.13341
|