共 50 条
- [2] A graph-based methodology for analyzing IP spoofing attack 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 227 - 230
- [3] Optiplan: Unifying IP-based and graph-based planning Journal of Artificial Intelligence Research, 1600, 24 : 919 - 931
- [4] Optiplan: Unifying IP-based and graph-based planning JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2005, 24 : 919 - 931
- [6] Graph-based malicious login events investigation 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 63 - 66
- [7] Identifying Concepts on Specific Domain by a Unsupervised Graph-Based Approach DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2012, 151 : 477 - 484
- [8] Blacklist-based Malicious IP Traffic Detection 2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 229 - 233
- [9] Identifying attack signatures for the Internet of Things An IP flow based approach 2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2019,
- [10] Identifying Loners from Their Project Collaboration Records - A Graph-Based Approach KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2020), PT I, 2020, 12274 : 194 - 201