共 50 条
- [31] Design and Implementation of Computer Worms Based on Monitoring Replication and Damage [J]. International Journal of Computer Science and Network Security, 2016, 16 (11): : 55 - 65
- [32] A computational model of computer worms based on persistent turing machines [J]. PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, VOLS 1 AND 2, 2006, : 453 - 456
- [34] Computer aided detection/computer aided classification and data fusion algorithms for automated detection and classification of underwater mines [J]. OCEANS 2000 MTS/IEEE - WHERE MARINE SCIENCE AND TECHNOLOGY MEET, VOLS 1-3, CONFERENCE PROCEEDINGS, 2000, : 277 - 284
- [35] Anomaly detection enhanced classification in computer intrusion detection [J]. PATTERN RECOGNITION WITH SUPPORT VECTOR MACHINES, PROCEEDINGS, 2002, 2388 : 186 - 197
- [36] Unknown Malware Detection Using Network Traffic Classification [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 134 - 142
- [37] RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM [J]. Journal of Computer Virology and Hacking Techniques, 2023, 19 : 241 - 255
- [38] Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM [J]. Journal of Computer Virology and Hacking Techniques, 2023, 19 : 637 - 637
- [39] HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android [J]. IEEE ACCESS, 2020, 8 : 23154 - 23168
- [40] Detection algorithm of scanning worms based on similarity analysis [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2011, 39 (05): : 73 - 77