共 50 条
- [31] Intrusion detection: Introduction to intrusion detection and security information management FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 207 - 236
- [32] Internet security and intrusion detection 25TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2003, : 748 - 749
- [33] Two-Frequency Surveillance Technique for Intrusion-Detection Sensor with Leaky Coaxial Cables 2014 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS), 2014, : 103 - 106
- [34] Security challenges in intrusion detection 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 350 - 360
- [36] Intrusion-detection for incident-response, using a military battlefield-intelligence process COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04): : 671 - 697
- [37] CMShark: A NetFlow and machine-learning based crypto-jacking intrusion-detection method Intelligent Decision Technologies, 2024, 18 (03): : 2255 - 2273
- [38] BREACHES OF COMPUTER SECURITY INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1983, 14 (02): : 87 - 93
- [40] FBG security fence for intrusion detection 2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,