共 50 条
- [1] Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 4189 - 4198
- [2] Detecting network cyber-attacks using an integrated statistical approach [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
- [3] Detecting network cyber-attacks using an integrated statistical approach [J]. Cluster Computing, 2021, 24 : 1435 - 1453
- [4] A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 152 - 159
- [5] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
- [6] A Comparative Study of Datasets for Cyber-attacks Detection in Wireless Sensor Networks [J]. 2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
- [7] A Fuzzy Intrusion Detection System for Identifying Cyber-Attacks on IoT Networks [J]. 2020 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2020), 2020,
- [8] Detecting cyber-attacks using a CRPS-based monitoring approach [J]. 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 618 - 622
- [9] Evaluation of Naive Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks [J]. 2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 283 - 289
- [10] Detecting impersonation attacks in future wireless and mobile networks [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 80 - 95