共 50 条
[21]
Capabilities of digital servitization: Evidence from the socio-technical systems theory
[J].
Technological Forecasting and Social Change,
2022, 176
[22]
Intrusion detection system using memtic algorithm supporting with genetic and decision tree algorithms
[J].
Int. J. Comput. Sci. Issues,
2 2-3 (508-514)
[23]
Policy-based intrusion detection in web applications by monitoring Java information flows
[J].
International Journal of Information and Computer Security,
2009, 3 (3-4)
:265-279
[24]
An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled approach
[J].
Journal of Information Security and Applications,
2022, 71
[25]
TTIDS : A Time-Driven Trust Based Intrusion Detection System for IoT Networks
[J].
Proceedings - 2022 9th International Conference on Wireless Networks and Mobile Communications, WINCOM 2022,
2022,
[26]
Research and simulation on the fast incremental SVM intrusion detection algorithm based on adjacent boundary area
[J].
Int. J. Digit. Content Technol. Appl.,
22 (262-269)
[27]
Optimal Multipath Planning for intrusion detection in smart homes using Wireless Sensor and Actor Networks
[J].
Proceedings of the International Conference on Parallel Processing Workshops,
2010,
:562-570
[29]
A Study on Self-Configuring Intrusion Detection Model based on Hybridized Deep Learning Models
[J].
Proc. - Int. Conf. Comput. Methodol. Commun., ICCMC,
(303-309)
[30]
Anomaly-Based Intrusion Detection System for In-Flight and Network Security in UAV Swarm
[J].
2023 International Conference on Unmanned Aircraft Systems, ICUAS 2023,
2023,
:812-819