共 44 条
[32]
Tactical Provenance Analysis for Endpoint Detection and Response Systems
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:1172-1189
[33]
Vasiliadis G, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P297
[34]
Dual Super-Resolution Learning for Semantic Segmentation
[J].
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2020,
:3773-3782
[35]
Wang W, 2017, 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P712, DOI 10.1109/ICOIN.2017.7899588
[38]
Pelican: A Deep Residual Network for Network Intrusion Detection
[J].
50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2020),
2020,
:55-62
[39]
Xu G, 2021, Journal of Physics: Conference Series, V1861