共 50 条
- [1] A systematic survey on multi-step attack detection [J]. COMPUTERS & SECURITY, 2018, 76 : 214 - 249
- [3] Detection algorithm for multi-step attack based on CTPN [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1383 - 1391
- [4] MAD: A Middleware Framework for Multi-Step Attack Detection [J]. 2015 4TH INTERNATIONAL WORKSHOP ON BUILDING ANALYSIS DATASETS AND GATHERING EXPERIENCE RETURNS FOR SECURITY (BADGERS), 2015, : 8 - 15
- [5] Multi-Step Attack Pattern Detection on Normalized Event Logs [J]. 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, : 390 - 398
- [6] Multi-Layer Filtering Approach for Hyperspectral Target Detection [J]. INTERNATIONAL SYMPOSIUM ON PHOTOELECTRONIC DETECTION AND IMAGING 2013: IMAGING SPECTROMETER TECHNOLOGIES AND APPLICATIONS, 2013, 8910
- [7] Development of multi-step filtering processor [J]. 6TH INTERNATIONAL CONFERENCE ON DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 1999, : 169 - 176
- [8] An Unsupervised Two-Layer Multi-Step Network Attack Detector [J]. IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1308 - 1309
- [9] MALICIOUS URL DETECTION USING MULTI-LAYER FILTERING MODEL [J]. 2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 97 - 100
- [10] Multi-step vortex filtering for phase extraction [J]. OPTICS EXPRESS, 2014, 22 (07): : 8503 - 8514