共 50 条
[31]
Intrusion detection system based on mobile agent
[J].
ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings,
2005,
:7888-7891
[32]
An intrusion detection system based on the clustering ensemble
[J].
2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION,
2007,
:121-+
[33]
Intrusion detection system based on data mining
[J].
Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT,
2006,
:1214-1218
[34]
An Intrusion Detection System Based On Fiber Hydrophone
[J].
AOPC 2017: FIBER OPTIC SENSING AND OPTICAL COMMUNICATIONS,
2017, 10464
[35]
A Deviation Based Outlier Intrusion Detection System
[J].
RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS,
2010, 89
:395-401
[36]
Acoustic Based Surveillance System For Intrusion Detection
[J].
AVSS: 2009 6TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE,
2009,
:314-319
[37]
Intrusion Detection System Based on SVM for WLAN
[J].
FIRST WORLD CONFERENCE ON INNOVATION AND COMPUTER SCIENCES (INSODE 2011),
2012, 1
:313-317
[38]
Intrusion detection with agent-based system
[J].
SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT,
2005,
:149-152
[39]
Intrusion Detection System Based on ViTCycleGAN and Rules
[J].
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT III, ICIC 2024,
2024, 14864
:203-214
[40]
Research on Intrusion Detection System based on IRBF
[J].
PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012),
2012,
:544-548