共 50 条
- [31] PROTECTION AGAINST BYZANTINE ATTACKS ON WIRELESS SENSOR NETWORKS 2011 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS (WINSYS 2011), 2011, : 53 - 58
- [32] An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 287 - 298
- [33] Network Protection Against Node Attacks Based on Probabilistic Availability Measures IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 2742 - 2763
- [34] Anomaly-Based Web Attack Detection: A Deep Learning Approach PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 80 - 85
- [35] An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement IEEE International Conference on Software Quality, Reliability and Security, QRS, 2022, 2022-December : 287 - 298
- [36] An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1680 - 1687
- [37] Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks Telecommunication Systems, 2018, 67 : 217 - 229
- [39] ANOMALY-BASED SPAM FILTERING SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 5 - 14
- [40] Unknown Attacks Detection Using Feature Extraction from Anomaly-based IDS Alerts 2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 273 - 277