|
|
|
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate...
ver más
|
|
|
|
|
|
|
K.-L. Chen, B.-C. Weng, M.-T. Chang, Y.-H. Liao, T.-T. Chen, and C. Chu
Pág. 2242 - 2249
|
|
|
|
|
|
|
S.-H. Song, R.G. Faulkner, P.E.J. Flewitt, P. Marmy and L.-Q. Weng
Pág. Pages 35-4
|
|
|
|
|
|
|
Chang, M.-W. Lin, C.-J. Weng, R. C.-H.
Pág. 720 - 727
|
|
|
|
|
|
|
Huang, C. S. Yeh, Y.-K. Liu, G.-Y. Hu, H.-T. Tsai, K. C. Weng, Y. T. Wang, S. H. Wu, M.-H.
Pág. 1222 - 1230
|
|
|
|
|
|
|
Weng, J F; Leung, S H
Pág. 1934 - 1949
|
|
|
|
|
|
|
Chan, Y-J; Huang, C-H; Weng, C-C; Liew, B-K
Pág. 611 - 615
|
|
|
|