共 50 条
- [2] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks [J]. International Journal of Advanced Computer Science and Applications, 2021, 12 (11): : 517 - 522
- [4] Cyber-Attacks Based in Electromagnetic Effects [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (06) : 2838 - 2845
- [5] Detecting cyber-attacks using a CRPS-based monitoring approach [J]. 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 618 - 622
- [6] Social Engineering Based Cyber-Attacks in Kenya [J]. 2020 IST-AFRICA CONFERENCE (IST-AFRICA), 2020,
- [7] Strategy Matrix for Containing Cyber-Attacks: A Generic Approach [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 207 - 215
- [8] Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (02): : 207 - 223
- [9] A model of deception during cyber-attacks on information systems [J]. 2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 21 - 30
- [10] Detecting network cyber-attacks using an integrated statistical approach [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453