Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/iceis/WeiLWZZD19
%A Wei, Jinxia
%A Long, Chun
%A Wan, Wei
%A Zhang, Yurou
%A Zhao, Jing
%A Du, Guanyao
%B ICEIS (2)
%D 2019
%E Filipe, Joaquim
%E Smialek, Michal
%E Brodsky, Alexander
%E Hammoudi, Slimane
%I SciTePress
%K dblp
%P 221-228
%T An Effective RF-based Intrusion Detection Algorithm with Feature Reduction and Transformation.
%U http://dblp.uni-trier.de/db/conf/iceis/iceis2019-2.html#WeiLWZZD19
%@ 978-989-758-372-8
@inproceedings{conf/iceis/WeiLWZZD19,
added-at = {2019-06-05T00:00:00.000+0200},
author = {Wei, Jinxia and Long, Chun and Wan, Wei and Zhang, Yurou and Zhao, Jing and Du, Guanyao},
biburl = {https://www.bibsonomy.org/bibtex/2446351efa6fa8bc35b37a4f3c85d8ddc/dblp},
booktitle = {ICEIS (2)},
crossref = {conf/iceis/2019-2},
editor = {Filipe, Joaquim and Smialek, Michal and Brodsky, Alexander and Hammoudi, Slimane},
ee = {https://doi.org/10.5220/0007718602210228},
interhash = {df453f1740ca9973a908ca7b5af94800},
intrahash = {446351efa6fa8bc35b37a4f3c85d8ddc},
isbn = {978-989-758-372-8},
keywords = {dblp},
pages = {221-228},
publisher = {SciTePress},
timestamp = {2024-04-10T02:41:07.000+0200},
title = {An Effective RF-based Intrusion Detection Algorithm with Feature Reduction and Transformation.},
url = {http://dblp.uni-trier.de/db/conf/iceis/iceis2019-2.html#WeiLWZZD19},
year = 2019
}