共 50 条
- [31] Intrusion detection of distributed denial of service attack in cloud CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623
- [32] Masquerade Attack Detection Through Observation Planning for Multi-Robot Systems AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 2262 - 2264
- [33] A Low-Cost Masquerade and Replay Attack Detection Method for CAN in Automobiles 2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, : 2178 - 2181
- [34] Evaluating Attack Resiliency for Host Intrusion Detection Systems JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (01): : 1 - 9
- [35] A Poisoning Attack on Intrusion Detection System Based on SVM Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (01): : 59 - 65
- [36] HyINT: Signature-Anomaly Intrusion Detection System 2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
- [37] Probabilistic inference strategy in distributed intrusion detection systems PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 835 - 844
- [38] Attack Prediction Models for Cloud Intrusion Detection Systems 2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 270 - 275
- [39] A Proposed Wireless Intrusion Detection Prevention and Attack System 2018 19TH INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2018, : 211 - 215
- [40] A signature match processor architecture for network intrusion detection FCCM 2005: 13TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2005, : 235 - 242