共 50 条
- [21] Detecting attacks in routers using sketches 2007 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2007, : 179 - +
- [22] A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger's Adversarial Attacks 59TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS AND THE 11TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING (ACL-IJCNLP 2021), VOL 1, 2021, : 3831 - 3844
- [23] Survey of Snaring Cyber Attacks on IoT Devices with Honeypots and Honeynets 2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
- [24] An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 3991 - 3999
- [26] Detecting Attacks on Web Applications using Autoencoder PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2018), 2018, : 416 - 421
- [27] SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots 2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 576 - 591
- [29] Shadow Detecting using Mathematical Morphology and Smirnov Test 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [30] Building Suspiciousness Cascading Graph over Multiple Hosts for Detecting Targeted Attacks 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,