共 50 条
- [41] Network traffic analysis from the Cyber Defense Exercise 2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4317 - 4321
- [42] Network Web Traffic Generator for Cyber Range Exercises PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 308 - 315
- [43] A Design of IL-CyTIS for Automated Cyber Threat Detection 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 689 - 693
- [44] WirelessHART network analyzer with coexistence detection 2014 12TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2014, : 696 - +
- [45] A Model of APT Attack Defense Based on Cyber Threat Detection CYBER SECURITY, CNCERT 2018, 2019, 970 : 122 - 135
- [46] Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation 2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
- [48] ChainSpot: Mining Service Logs for Cyber Security Threat Detection 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1867 - 1874
- [49] Deep learning for cyber threat detection in IoT networks: A review Internet of Things and Cyber-Physical Systems, 2024, 4 : 110 - 128
- [50] Cyber Threat Landscape in Cyber Space 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 375 - 380