共 77 条
[3]
Ahmad S., 2022, Cyber security threat and Pakistans preparedness: An analysis of national cyber security policy 2021, DOI [https://doi.org/10.37605/pjhssr.v5i1.381, DOI 10.37605/PJHSSR.V5I1.381]
[4]
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
[J].
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING,
2021, 6 (02)
:184-196
[5]
XAI-IDS: Toward Proposing an Explainable Artificial Intelligence Framework for Enhancing Network Intrusion Detection Systems
[J].
APPLIED SCIENCES-BASEL,
2024, 14 (10)
[7]
Battiato Sebastiano, 2021, Pattern Recognition. ICPR International Workshops and Challenges. Proceedings. Lecture Notes in Computer Science (LNCS 12666), P573, DOI 10.1007/978-3-030-68780-9_45
[8]
Bayar B, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), P2007, DOI 10.1109/ICASSP.2018.8462383