Found: 15
Select item for more details and to access through your institution.
A Hybrid Association Rule-Based Method to Detect and Classify Botnets.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/1028878
- By:
- Publication type:
- Article
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/6641844
- By:
- Publication type:
- Article
Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2019, v. 33, n. 14, p. N.PAG, doi. 10.1142/S0218001419550152
- By:
- Publication type:
- Article
A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2019, v. 33, n. 13, p. N.PAG, doi. 10.1142/S0218001419580096
- By:
- Publication type:
- Article
Resolving Cross-Site Scripting Attacks through Fusion Verification and Machine Learning.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 20, p. 3787, doi. 10.3390/math10203787
- By:
- Publication type:
- Article
Twitter Bots in Cyber-Physical-Social Systems: Detection and Estimation Based on the SEIR Model.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/6234030
- By:
- Publication type:
- Article
Integrating Traffics with Network Device Logs for Anomaly Detection.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/5695021
- By:
- Publication type:
- Article
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/3898951
- By:
- Publication type:
- Article
TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 8, p. 2630, doi. 10.3390/s18082630
- By:
- Publication type:
- Article
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning.
- Published in:
- Journal of Cloud Computing (2192-113X), 2024, v. 13, n. 1, p. 1, doi. 10.1186/s13677-024-00678-w
- By:
- Publication type:
- Article
RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 3, p. 5743, doi. 10.32604/cmc.2023.035919
- By:
- Publication type:
- Article
Personalized and privacy-preserving federated graph neural network.
- Published in:
- Frontiers in Physics, 2024, p. 1, doi. 10.3389/fphy.2024.1383276
- By:
- Publication type:
- Article
A Novel Semi-Quantum Private Comparison Scheme Using Bell Entangle States.
- Published in:
- Computers, Materials & Continua, 2021, v. 66, n. 3, p. 2385, doi. 10.32604/cmc.2021.012696
- By:
- Publication type:
- Article
Confidential information protection method of commercial information physical system based on edge computing.
- Published in:
- Neural Computing & Applications, 2021, v. 33, n. 3, p. 897, doi. 10.1007/s00521-020-05272-0
- By:
- Publication type:
- Article
Research on information steganography based on network data stream.
- Published in:
- Neural Computing & Applications, 2021, v. 33, n. 3, p. 851, doi. 10.1007/s00521-020-05260-4
- By:
- Publication type:
- Article