共 50 条
[24]
Attackers are not Stealthy: Statistical Analysis of the Well-Known and Infamous KDD Network Security Dataset
[J].
2020 4TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT,
2020,
:1-8
[25]
Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)
[J].
SECURITY PROTOCOLS XXII,
2014, 8809
:91-99
[29]
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)
[J].
SECURITY PROTOCOLS XXII,
2014, 8809
:69-90
[30]
An Efficient Security Framework for Detection and Isolation of Attackers in Low Rate Wireless Personal Area Networks
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2008, 8 (07)
:224-232