共 50 条
- [32] Comparative study between Bayesian network and possibilistic network in intrusion detection SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 24 - +
- [33] Attack Graph Algorithm in the Application of Intrusion Detection System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
- [35] A Poisoning Attack on Intrusion Detection System Based on SVM Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (01): : 59 - 65
- [36] A Proposed Wireless Intrusion Detection Prevention and Attack System 2018 19TH INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2018, : 211 - 215
- [37] PANDA: Practical Adversarial Attack Against Network Intrusion Detection 2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME, DSN-S 2024, 2024, : 28 - 32
- [38] PIECEWISE CLASSIFICATION OF ATTACK PATTERNS FOR EFFICIENT NETWORK INTRUSION DETECTION SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 100 - 104
- [39] Parallelization of Network Intrusion Detection Systems under Attack Conditions DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2014, 2014, 8550 : 172 - 191
- [40] Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 147 - 154