共 15 条
[1]
Al-Emadi S., 2020, INT C INF IOT EN TEC, P1
[2]
Alahmari A., 2020, 2020 INT C CYB SIT A, P1
[3]
Amarasinghe A. M. S. N., 2019, 2019 International Conference on Advancements in Computing (ICAC), P363, DOI 10.1109/ICAC49085.2019.9103372
[4]
Halawa L. J., 2019, 2019 3 INT C INFORMA, P1
[6]
Characterization of Tor Traffic using Time based Features
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:253-262
[7]
Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles
[J].
IEEE ACCESS,
2019, 7
:165607-165626
[8]
Mujaddidurrahman Auliya, 2021, 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM), P685, DOI 10.1109/ICSECS52883.2021.00130
[9]
Naseer S., 2020, SYMMETRY, V12, P1
[10]
Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture
[J].
2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019),
2019,
:366-370