共 50 条
- [11] PERFORMANCE COMPARISON OF SIGNATURE-BASED MULTIKEY ACCESS METHODS MICROPROCESSING AND MICROPROGRAMMING, 1992, 35 (1-5): : 345 - 352
- [12] CBSigIDS: Towards Collaborative Blockchained Signature-based Intrusion Detection IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1228 - 1235
- [14] USAID: Unifying signature-based and anomaly-based intrusion detection ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 702 - 712
- [16] SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 256 - 266
- [19] A Signature-based Assistant Random Oversampling Method for Malware Detection 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 256 - 263
- [20] Using decision trees to improve signature-based intrusion detection RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 173 - 191