共 50 条
- [42] Guidelines for Using Machine Learning Technology to Ensure Information Security [J]. 2020 12TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2020), 2020, : 285 - 290
- [43] A New Framework for Cloud Storage Confidentiality to Ensure Information Security [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
- [45] An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme [J]. COMPUTER JOURNAL, 2024, 67 (06): : 2317 - 2330
- [46] Regulatory Compliance to Ensure Information Security: Financial Supervision Perspective [J]. PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 298 - 306
- [47] POSSIBILITIES OF MPR AND USSR INFORMATION-SYSTEM INTEGRATIONS [J]. NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 1-ORGANIZATSIYA I METODIKA INFORMATSIONNOI RABOTY, 1984, (10): : 22 - 23
- [48] Anomaly Detection System Towards a framework for enterprise log management of security services [J]. 2014 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2014, : 97 - 102
- [49] Communication Network Anomaly Detection Based on Log File Analysis [J]. ROUGH SETS AND KNOWLEDGE TECHNOLOGY, RSKT 2014, 2014, 8818 : 240 - 248
- [50] Detecting Packed Executable File: Supervised or Anomaly Detection Method ? [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 638 - 643