共 50 条
- [31] Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics Wireless Personal Communications, 2022, 122 : 2701 - 2722
- [33] Evaluating clustering techniques for network intrusion detection TENTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2004, : 173 - 177
- [34] Advanced Techniques for Reconstruction of Incomplete Network Data DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2015, 2015, 157 : 69 - 84
- [36] Data mining tools -a case study for network intrusion detection Multimedia Tools and Applications, 2021, 80 : 4999 - 5019
- [37] The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (03):
- [38] Machine Learning Techniques for Classifying Network Anomalies and Intrusions 2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
- [39] Anomaly detection in network security based on nonparametric techniques 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 3240 - 3241
- [40] Evaluation and Comparison of Classification Techniques for Network Intrusion Detection 2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 335 - 342