共 50 条
- [41] Graph-based analysis of evolutionary algorithm INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2005, : 329 - 338
- [43] Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks COMPUTER JOURNAL, 2015, 58 (06): : 1280 - 1292
- [44] Large scale distributed intrusion detection framework based on attack strategy analysis Comput. Networks, 23 (2465-2475):
- [45] Interpreting and predicting social commerce intention based on knowledge graph analysis Electronic Commerce Research, 2020, 20 : 197 - 222
- [46] A large scale distributed intrusion detection framework based on attack strategy analysis COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (23-24): : 2465 - 2475
- [48] Real-time Network Attack Intention Recognition Algorithm INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 51 - 61
- [49] Power Analysis Attack Based on FCM Clustering Algorithm 14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM 2018), 2018, 306 : 558 - 567
- [50] Attack Intention Analysis Model for Network Forensics SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411