共 246 条
[1]
Abdulhammed R, 2018, INT WIREL COMMUN, P524, DOI 10.1109/IWCMC.2018.8450479
[2]
A Scalable Role Mining Approach for Large Organizations
[J].
PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2021,
2021,
:45-54
[3]
From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
[J].
IEEE ACCESS,
2020, 8
:19089-19099
[4]
DAHID: Domain Adaptive Host-based Intrusion Detection
[J].
PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR),
2021,
:467-472
[5]
Aksoy A, 2019, IEEE ICC
[6]
Al Najada H, 2018, 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), P631, DOI 10.1109/SSCI.2018.8628685
[7]
Al-hadhrami Nasser, 2020, SIN 2020: Proceedings of the 13th International Conference on Security of Information and Networks, DOI 10.1145/3433174.3433175
[8]
An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things
[J].
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019),
2018,
:83-87