[1]Zscaler. 2020 State of Encrypted Attacks[EBOL]. USA, Zscaler, 2020 [20230204]. https:www.zscaler.comresourcesindustryreportsstateofencryptedattackssummaryreport.pdf[2]Canard S, Diop A, Kheir N, et al. BlindIDS: Marketcompliant and privacyfriendly intrusion detection system over encrypted traffic[C] Proc of the 2017 ACM on Asia Conf on Computer and Communications Security. Abu Dhabi, UAE: ACM, 2017: 561574[3]刘定祥, 乔少杰, 张永清, 等. 不平衡分类的数据采样方法综述[J]. 重庆理工大学学报: 自然科学, 2019, 33(7): 102112[4]Wagner D, Schneier B. Analysis of the SSL 3.0 protocol[C] Proc of the 2nd USENIX Workshop on Electronic Commerce Proceedings. Berkeley, CA: USENIX Association, 1996: 2940[5]姚旭, 王晓丹, 张玉玺, 等. 特征选择方法综述[J]. 控制与决策, 2012, 27(2): 161166[6]方匡南, 吴见彬, 朱建平, 等. 随机森林方法研究综述[J]. 统计与信息论坛, 2011, 26(3): 3238[7]李郅琴, 杜建强, 聂斌, 等. 特征选择方法综述[J]. 计算机工程与应用, 2019, 55(24): 1019[8]Chen T, Guestrin C. Xgboost: A scalable tree boosting system[C] Proc of the 22nd ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining. San Francisco, CA: ACM, 2016: 785794[9]吕蔚萁. 基于高斯朴素贝叶斯分类器的特征预测能力检测[D]. 天津: 天津大学, 2023[10]刘京, 田博彦, 刘远龙, 等. 新型电力系统环境下FBMC系统信道估计[J]. 山东电力技术, 2023, 50(8): 6773
|