[1] Cisco V. Cisco visual networking index:forecast and trends, 2017-2022[R]. San Jose:[s.n.], 2018:1-38. [2] Ahmed M, Mahmood A N, Hu J. A survey of network anomaly detection techniques[J]. Journal of Network and Computer Applications, 2016(1):19-31. [3] Li C, Gu Z, Zhou M, et al. API misuse detection in C programs:practice on SSL APIs[J]. International Journal of Software Engineering & Knowledge Engineering, 2019, 29(11):1761-1779. [4] 吉星, 黄韬, 鄂新华, 等. 基于日志信息的DNS查询异常检测算法[J]. 北京邮电大学学报, 2018, 41(6):83-89. Ji Xing, Huang Tao, E Xinhua, et al. A DNS query anomaly detection algorithm based on log information[J]. Journal of Beijing University of Posts and Telecommunications, 2018, 41(6):83-89. [5] Du Z, Ma L, Li H, et al. Network traffic anomaly detection based on wavelet analysis[C]//2018 IEEE 16th International Conference on Software Engineering Research, Management and Applications (SERA). Kunming:IEEE, 2018:94-101. [6] Wang M, Cui Y, Wang X, et al. Machine learning for networking:workflow, advances and opportunities[J]. IEEE Network, 2017, 32(2):92-99. [7] Almseidin M, Alzubi M, Kovacs S, et al. Evaluation of machine learning algorithms for intrusion detection system[C]//2017 IEEE 15th International Symposium on IntelLigent Systems and Informatics (SISY). Subotica:IEEE, 2017:277-282. [8] Sharafaldin I, Lashkari A H, Ghorbani A A. Toward generating a new intrusion detection dataset and intrusion traffic characterization[C]//ICISSp. Portugal:SciTePress, 2018:108-116. [9] Canadian Institute for Cybersecurity. CSE-CIC-IDS2018 on AWS[DB/OL]. Canadian:University of New Brunswick, 2019:1-1[2020-04-01]. https://www.unb.ca/cic/datasets/ids-2018.html. [10] Pan S J, Yang Q. A survey on transfer learning[J]. IEEE Transactions on Knowledge and Data Engineering, 2009, 22(10):1345-1359. [11] Long M, Wang J, Ding G, et al. Transfer feature learning with joint distribution adaptation[C]//Proceedings of the IEEE International Conference on Computer Vision. Sydney:IEEE, 2013:2200-2207. [12] Pan S J, Tsang I W, Kwok J T, et al. Domain adaptation via transfer component analysis[J]. IEEE Transactions on Neural Networks, 2010, 22(2):199-210. |