共 50 条
- [21] Network Attack Origin Forensics with Fuzzy Logic A case study on buffer overflow attack 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2015, : 67 - 72
- [22] Network Anomaly Detection: Methods, Systems and Tools IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 303 - 336
- [26] Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics annals of telecommunications - annales des télécommunications, 2014, 69 : 379 - 389
- [27] Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics 19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,