共 50 条
- [1] Detecting Malicious Clients in ISP Networks Using HTTP Connectivity Graph and Flow Information 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), 2014, : 150 - 157
- [2] Detecting Malicious Blockchain Transactions Using Graph Neural Networks DISTRIBUTED LEDGER TECHNOLOGY, SDLT 2023, 2024, 1975 : 55 - 71
- [3] A Method of Detecting a Malicious Actions using HTTP and FTP Protocols PROCEEDINGS OF THE 2017 INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), 2017, : 1083 - 1088
- [4] Detecting Malicious HTTP Redirections Using Trees of User Browsing Activity 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1159 - 1167
- [5] Detecting wormhole attacks in wireless networks using connectivity information INFOCOM 2007, VOLS 1-5, 2007, : 107 - +
- [6] NESTEDGNN: Detecting Malicious Network Activity with Nested Graph Neural Networks IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 2694 - 2699
- [7] Detecting Malicious HTTP Requests Without Log Parser Using RequestBERT-BiLSTM INTELLIGENT SYSTEMS, PT II, 2022, 13654 : 328 - 342
- [8] Detecting Malicious Logins in Enterprise Networks Using Visualization 2016 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2016,
- [10] De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (06): : 3230 - 3253