共 50 条
- [21] ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 241 - 268
- [23] Detecting IoT Attacks using Multi-Layer Data Through Machine Learning 2022 SECOND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND HIGH PERFORMANCE COMPUTING (DCHPC), 2022, : 52 - 59
- [24] Data Mining Methods to Analyze Alarm Logs in IoT Process Control Systems 2019 IEEE 15TH INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2019, : 323 - 330
- [25] HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 5005 - 5019
- [27] NICE: The Native IoT-Centric Event Log Model for Process Mining PROCESS MINING WORKSHOPS, ICPM 2023, 2024, 503 : 32 - 44
- [29] Mining classification algorithms to identify flooding attacks through the HTTP/3 protocol 2023 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS, 2023, : 1259 - 1264
- [30] Analyzing the Devil's Quadrangle of Process Instances Through Process Mining BUSINESS PROCESS MANAGEMENT WORKSHOPS, BPM 2023, 2024, 492 : 272 - 284