共 50 条
- [41] Insider Attack Detection using Weak Indicators over Network Flow Data [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1 - 6
- [42] Real-time Traffic Monitoring and SQL Injection Attack Detection for Edge Networks [J]. Q2SWINET'19: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2019, : 29 - 36
- [43] An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection [J]. Computer Systems Science and Engineering, 2023, 46 (02): : 1759 - 1774
- [46] Detection of false data injection attack in the Internet of things [J]. MANAGEMENT, MANUFACTURING AND MATERIALS ENGINEERING, PTS 1 AND 2, 2012, 452-453 : 932 - +
- [47] Detection of False Data Injection Attack for Interconnected Systems [J]. 2022 41ST CHINESE CONTROL CONFERENCE (CCC), 2022, : 939 - 946
- [49] A Review of Database Forensic Analysis For SQL Injection Attack [J]. VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 201 - 206
- [50] DESIGN AND IMPLEMENTATION OF A DEFENSE MECHANISM FOR SQL INJECTION ATTACK [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1499 - 1506