共 50 条
- [31] Study of Intrusion Detection Systems [J]. Journal of Electronic Science and Technology, 2012, (03) : 269 - 275
- [33] Intrusion Detection in Database Systems [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 93 - 101
- [34] A Review on Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT [J]. 2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 588 - 593
- [35] Study of Intrusion Detection Systems [J]. Journal of Electronic Science and Technology, 2012, 10 (03) : 269 - 275
- [36] Insights into Anomaly-based Intrusion Detection Systems Usability. A Case Study using Real HTTP Requests [J]. PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024, 2024, : 82 - 89
- [37] Traffic Modeling by Recurrent Neural Networks for Intrusion Detection in Industrial Control Systems [J]. 2019 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2019,
- [38] Packet-vs. session-based modeling for intrusion detection systems [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 116 - 121
- [39] Adaptation techniques for intrusion detection and intrusion response systems [J]. SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2344 - 2349
- [40] Modeling and generation of detectors in artificial immune based network intrusion detection systems [J]. ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 238 - 244