Пожалуйста, войдите в систему, чтобы принять участие в дискуссии (добавить собственные рецензию, или комментарий)
Цитировать эту публикацию
%0 Conference Paper
%1 conf/ica3pp/XuCWTX18
%A Xu, Ruomeng
%A Cheng, Jieren
%A Wang, Fengkai
%A Tang, Xiangyan
%A Xu, Jinying
%B ICA3PP (Workshops)
%D 2018
%E Hu, Ting
%E Wang, Feng
%E Li, Hongwei
%E Wang, Qian
%I Springer
%K dblp
%P 165-176
%T A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment.
%U http://dblp.uni-trier.de/db/conf/ica3pp/ica3pp2018w.html#XuCWTX18
%V 11338
%@ 978-3-030-05234-8
@inproceedings{conf/ica3pp/XuCWTX18,
added-at = {2019-10-19T00:00:00.000+0200},
author = {Xu, Ruomeng and Cheng, Jieren and Wang, Fengkai and Tang, Xiangyan and Xu, Jinying},
biburl = {https://www.bibsonomy.org/bibtex/296e3452476b0521b73ef7149609984a4/dblp},
booktitle = {ICA3PP (Workshops)},
crossref = {conf/ica3pp/2018w},
editor = {Hu, Ting and Wang, Feng and Li, Hongwei and Wang, Qian},
ee = {https://doi.org/10.1007/978-3-030-05234-8_21},
interhash = {025dd91b6bb29ef8151c1084f0ffea3d},
intrahash = {96e3452476b0521b73ef7149609984a4},
isbn = {978-3-030-05234-8},
keywords = {dblp},
pages = {165-176},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-10-22T15:04:06.000+0200},
title = {A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment.},
url = {http://dblp.uni-trier.de/db/conf/ica3pp/ica3pp2018w.html#XuCWTX18},
volume = 11338,
year = 2018
}