共 50 条
- [41] An intrusion-tolerant intrusion detection method based on real-time sequence analysis [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2692 - +
- [42] WIDS Real-Time Intrusion Detection System Using Entrophical Approach [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 73 - 79
- [43] Feature weighting and selection for a real-time network intrusion detection system based on GA with KNN [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 195 - 204
- [44] A host-based real-time intrusion detection system with data mining and forensic techniques [J]. 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 580 - 586
- [45] Real-time Intrusion Detection System based on Self-Organized Maps and Feature Correlations [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1154 - +
- [46] CONDITIONAL RANDOM FIELDS BASED REAL-TIME INTRUSION DETECTION FRAMEWORK [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 186 - 189
- [47] A Real-time CSI-based Passive Intrusion Detection Method [J]. 2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 1091 - 1098
- [48] Real-Time Packet-Based Intrusion Detection on Edge Devices [J]. 2023 CYBER-PHYSICAL SYSTEMS AND INTERNET-OF-THINGS WEEK, CPS-IOT WEEK WORKSHOPS, 2023, : 234 - 240
- [49] RAPID: Real-time Anomaly-based Preventive Intrusion Detection [J]. PROCEEDINGS OF THE 2019 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING (WISEML '19), 2019, : 49 - 54
- [50] A REAL-TIME TRACKING SYSTEM FOR TAILGATING BEHAVIOR DETECTION [J]. VISAPP 2009: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON COMPUTER VISION THEORY AND APPLICATIONS, VOL 2, 2009, : 398 - 402