共 50 条
- [21] Benchmarking anomaly-based detection systems [J]. DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2000, : 623 - 630
- [22] AN ANOMALY-BASED WEB APPLICATION FIREWALL [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 23 - 28
- [23] An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion [J]. IEEE ACCESS, 2024, 12 : 62750 - 62764
- [27] IEEE 802.11 Anomaly-based Behavior Analysis [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
- [28] Deconstructing the Assessment of Anomaly-based Intrusion Detectors [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 286 - 306
- [29] Aggregation and Thresholding Schemes for Anomaly-Based Approaches [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 140 - 152