共 50 条
- [41] Design of an Anomaly-based Threat Detection & Explication System [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 397 - 402
- [42] Anomaly-based fault detection system in distributed system [J]. SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 782 - +
- [43] Anomaly-based Identification of Large-Scale Attacks [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6638 - 6643
- [44] A transparent and scalable anomaly-based DoS detection method [J]. COMPUTER NETWORKS, 2016, 104 : 27 - 42
- [45] Anomaly-based intrusion monitoring using a dynamic honeypot [J]. PROCEEDINGS OF THE ISCA 20TH INTERNATIONAL CONFERENCE ON COMPUTERS AND THEIR APPLICATIONS, 2005, : 184 - 189
- [46] Virtual Machine Introspection for Anomaly-Based Keylogger Detection [J]. 2020 IEEE 21ST INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2020,
- [47] An Adaptive Anomaly-based Intrusion Prevention System for Databases [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 3382 - 3389
- [48] Anomaly-based intrusion detection using Bayesian networks [J]. DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +
- [49] Integrating Anomaly-Based Approach into Bayesian Network Classifiers [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 127 - 139
- [50] SCADA Networks Anomaly-based Intrusion Detection System [J]. 11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,