共 50 条
- [21] Probe Attack Detection Using an Improved Intrusion Detection System CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 4769 - 4784
- [22] Unknown Attack Detection: Combining Relabeling and Hybrid Intrusion Detection CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 3289 - 3303
- [23] Visual Analytics Model for Intrusion Detection in Flood Attack 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 277 - 284
- [24] Attack Graph Algorithm in the Application of Intrusion Detection System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
- [25] Intrusion Detection with Hypergraph-Based Attack Models GRAPH STRUCTURES FOR KNOWLEDGE REPRESENTATION AND REASONING, GKR 2013, 2014, 8323 : 58 - 73
- [27] Intrusion detection of distributed denial of service attack in cloud Cluster Computing, 2019, 22 : 10615 - 10623
- [28] Signature Based Semantic Intrusion Detection System on Cloud INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 657 - 666
- [29] Masquerade intrusion detection algorithm based on interval type-2 fuzzy set Tien Tzu Hsueh Pao, 2008, 4 (777-780):
- [30] Analysis of intrusion detection and attack proliferation in computer networks BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2007, 954 : 443 - +