共 50 条
- [1] Detection of unknown computer worms activity based on computer Behavior using data mining [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN SECURITY AND DEFENSE APPLICATIONS, 2007, : 169 - +
- [2] Detection of unknown computer worms activity based on computer Behavior using data mining [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 202 - 209
- [3] Improving the detection of unknown computer worms activity using active learning [J]. KI 2007: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4667 : 489 - +
- [4] Proactive password checking using neural network [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 229 - 233
- [6] Proactive Fault Detection in Computer Networks [J]. 2014 FIRST INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2014, : 90 - 91
- [7] Hardware Trojan Detection using ATPG and Model Checking [J]. 2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 91 - 96
- [8] Detection of Security Vulnerabilities Using Guided Model Checking [J]. LOGIC PROGRAMMING, PROCEEDINGS, 2008, 5366 : 822 - 823
- [10] Computer Worms: Architectures, Evasion Strategies, and Detection Mechanisms [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (01): : 69 - 83