共 155 条
- [1] Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests [J]. 2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 1880 - 1887
- [2] Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
- [4] Ahmed M., 2020, Journal of Nursing and Health Science, V9, P53
- [5] Ahram T, 2017, 2017 IEEE TECHNOLOGY & ENGINEERING MANAGEMENT SOCIETY CONFERENCE (TEMSCON), P137, DOI 10.1109/TEMSCON.2017.7998367
- [6] Comprehensive Survey on Petya Ransomware Attack [J]. 2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, : 122 - 125
- [7] Ajagbe Sunday Adeola, 2019, International Journal of Scientific and Engineering Research, V10, P848
- [8] Akarca D, 2019, PROCEEDINGS OF THE 2019 10TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), P108, DOI [10.1109/dessert.2019.8770037, 10.1109/DESSERT.2019.8770037]
- [9] Akhtar Mubeen., 2024, Cosmic Journal of Biology, V3, P184