共 81 条
[13]
Reverse TCP and Social Engineering Attacks in the Era of Big Data
[J].
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS),
2016,
:90-95
[16]
Two-Stage Decomposition of SNORT Rules towards Efficient Hardware Implementation
[J].
2009 7TH INTERNATIONAL WORKSHOP ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN 2009),
2009,
:359-366
[17]
The Application of Extreme Learning Machines to the Network Intrusion Detection Problem
[J].
NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B,
2012, 1479
:1506-1511
[18]
Desai P, 2015, IEEE INT CONF MO, P313, DOI [10.1109/MS.2015.51, 10.1109/MobServ.2015.51]