共 50 条
- [32] Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN [J]. PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFV '19), 2019, : 13 - 16
- [34] Assessing Centroid-Based Classification Models for Intrusion Detection System Using Composite Indicators [J]. FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 665 - 676
- [35] Optimizing anomaly-based attack detection using classification machine learning [J]. NEURAL COMPUTING & APPLICATIONS, 2024, 36 (06): : 3239 - 3257
- [36] Optimizing anomaly-based attack detection using classification machine learning [J]. Neural Computing and Applications, 2024, 36 : 3239 - 3257
- [37] Centroid-based sifting for empiricalmode decomposition [J]. Journal of Zhejiang University: Science C, 2011, 12 (02): : 88 - 95
- [38] RANDOM CENTROID INITIALIZATION FOR IMPROVING CENTROID-BASED CLUSTERING [J]. Decision Making: Applications in Management and Engineering, 2023, 6 (02): : 734 - 746
- [40] Graph and Centroid-based Word Clustering [J]. 2020 4TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING AND INFORMATION RETRIEVAL, NLPIR 2020, 2020, : 163 - 168