共 28 条
[3]
Malicious Spam Emails Developments and Authorship Attribution
[J].
2013 FOURTH CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2013),
2014,
:58-+
[4]
A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing
[J].
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018),
2018, 141
:24-31
[6]
Fusion of deep learning based cyberattack detection and classification model for intelligent systems
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2023, 26 (02)
:1363-1374
[9]
An efficient malware detection approach with feature weighting based on Harris Hawks optimization
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2022, 25 (04)
:2369-2387