共 50 条
- [31] An attack graph-based probabilistic computing approach of network security [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (10): : 1987 - 1996
- [32] DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning [J]. 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 623 - 634
- [33] Twin Graph-based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System [J]. 2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, : 66 - 78
- [34] Threat Analysis of IoT Security Knowledge Graph Based on Confidence [J]. EMERGING TECHNOLOGIES FOR EDUCATION, SETE 2021, 2021, 13089 : 254 - 264
- [35] A Graph-based Trust-enhanced Recommender System for Service Selection in IOT [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 358 - 362
- [36] Attack Graph-Based Quantitative Assessment for Industrial Control System Security [J]. 2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 1748 - 1753
- [37] A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1493 - 1501
- [38] A Graph-Based Modular Coding Scheme Which Achieves Semantic Security [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 822 - 826