Author:
Roy Indranil,Sonthalia Shekhar,Mandal Trideep,Kairi Animesh,Chakraborty Mohuya
Reference32 articles.
1. Gupta, A., Klavinsky, T., Laliberte, S.: Security through penetration testing: internet penetration. InformIT. Pearson PLC. Retrieved 2013-03-31 (2002)
2. RFC 2828 Internet Security Glossary
3. Mitchell, T., Buchanan, B., DeJong, G., Dietterich, T., Rosenbloom, P., Waibel, A: Machine Learning. Annu. Rev. Comput. Sci. 4:417–433 (Volume publication date June 1990)
4. Wang, M.., Cui, Y.., Wang, X.., Xiao, S., Jiang, J.: Machine learning for Networking: Workflow, Advances and Opportinities. IEEE Network
https://doi.org/10.1109/mnet20121700200
5. Boutaba, R., Salahuddin, M.A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, Felipe, Caicedo, O.M.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9, 16 (2018)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献