共 41 条
- [1] Abdullah Malak, 2022, 2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS), P1, DOI 10.1109/SNAMS58071.2022.10062688
- [3] An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things [J]. 3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, : 83 - 87
- [4] Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 469 - 482
- [5] Balash DG, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P3397
- [6] Ben-Moshe S., OPWNAI AI CAN SAVE D
- [7] Brown TB., 2020, ADV NEURAL INFORM PR, DOI DOI 10.48550/ARXIV.2005.14165
- [8] checkpoint, CHECKP CYB BYP CHATG
- [9] Clark Elizabeth, 2021, ARXIV