共 50 条
- [2] Automated Flow-based Rule Generation for Network Intrusion Detection Systems [J]. 2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
- [3] Flow-based intrusion detection: Techniques and challenges [J]. COMPUTERS & SECURITY, 2017, 70 : 238 - 254
- [4] An Overview of IP Flow-Based Intrusion Detection [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (03): : 343 - 356
- [5] Flow-Based Intrusion Detection System for SDN [J]. 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 787 - 793
- [6] SSHCure: A Flow-Based SSH Intrusion Detection System [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 86 - 97
- [7] Clustering and Neural Visualization for Flow-Based Intrusion Detection [J]. INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 333 - 345
- [8] A Labeled Data Set for Flow-Based Intrusion Detection [J]. IP OPERATIONS AND MANAGEMENT, PROCEEDINGS, 2009, 5843 : 39 - 50
- [9] A flow-based intrusion detection framework for internet of things networks [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 37 - 57
- [10] Intrusion Detection Using Flow-Based Analysis of Network Traffic [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399