Author:
Bontemps Loïc,Cao Van Loi,McDermott James,Le-Khac Nhien-An
Publisher
Springer International Publishing
Reference16 articles.
1. LSTM networks for sentiment analysis. In: LSTM networks for sentiment analysis deeplearning 0.1 documentation. http://deeplearning.net/tutorial/lstm.html#lstm . Accessed 25 Jun 2016
2. DARPA intrusion detection evaluation. (n.d.). http://www.ll.mit.edu/ideval/data/1999data.html . Accessed 30 June 2016
3. Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)
4. Bhattacharyya, D.K., Kalita, J.K.: Network Anomaly Detection: A Machine Learning Perspective. CRC Press, Boca Raton (2013)
5. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)
Cited by
155 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献