共 50 条
- [21] The Research of a Cooperative Model Intrusion Detection System 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 510 - 513
- [24] Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (04):
- [25] OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 700 - 715
- [26] Building an Application Data Behavior Model for Intrusion Detection DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 299 - 306
- [27] Application of rough set theory to intrusion detection system GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, 2007, : 562 - +
- [28] Attack Graph Algorithm in the Application of Intrusion Detection System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
- [29] A semantics based application level intrusion detection system 2007 INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING, COMMUNICATIONS AND NETWORKING, VOLS 1 AND 2, 2006, : 338 - +
- [30] The Application of Data Mining Technology in the Intrusion Detection System THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211