共 50 条
- [1] Anomaly-Based Web Attack Detection: A Deep Learning Approach [J]. PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 80 - 85
- [2] An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement [J]. 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 287 - 298
- [3] An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement [J]. IEEE International Conference on Software Quality, Reliability and Security, QRS, 2022, 2022-December : 287 - 298
- [4] AN ANOMALY-BASED WEB APPLICATION FIREWALL [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 23 - 28
- [5] Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems [J]. 2015 8TH INTERNATIONAL CONFERENCE ON DATABASE THEORY AND APPLICATION (DTA), 2015, : 37 - 41
- [6] On the effects of learning set corruption in anomaly-based detection of web defacements [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2007, 4579 : 60 - +
- [8] Collaborative anomaly-based attack detection [J]. SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2007, 4725 : 280 - +
- [9] An algorithm for anomaly-based botnet detection [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 2ND WORKSHOP ON STEPS TO REDUCING UNWANTED TRAFFIC ON THE INTERNET, 2006, : 43 - +
- [10] Benchmarking anomaly-based detection systems [J]. DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2000, : 623 - 630