-
1
Big Data Application in Network Security Analysis
Published 2015-07-01Subjects: Get full text
Article -
2
Application of security analysis technology for network big data
Published 2017-03-01Subjects: Get full text
Article -
3
DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
Published 2025-01-01Subjects: “…Attack detection…”
Get full text
Article -
4
LDoS attack detection method based on simple statistical features
Published 2022-11-01Subjects: Get full text
Article -
5
Machine learning-based detection, identification and restoration method of jamming attacks in optical networks
Published 2023-07-01Subjects: Get full text
Article -
6
Efficient detection technology of DDoS attacks based onBF-DT-CUSUM algorithm in smart grid industrial control system
Published 2015-12-01Subjects: Get full text
Article -
7
Attack detection method based on spatiotemporal event correlation in intranet environment
Published 2020-01-01Subjects: Get full text
Article -
8
A survey on DNS attack detection and security protection
Published 2022-09-01Subjects: Get full text
Article -
9
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01Subjects: Get full text
Article -
10
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01Subjects: Get full text
Article -
11
LEACH protocol based security mechanism for Sybil attack detection
Published 2011-01-01Subjects: Get full text
Article -
12
Research on link detection technology based on dynamic browser fingerprint
Published 2022-08-01Subjects: Get full text
Article -
13
Efficient attack detection and data aggregation algorithm
Published 2012-09-01Subjects: Get full text
Article -
14
DDoS attack detection and defense based on hybrid deep learning model in SDN
Published 2018-07-01Subjects: Get full text
Article -
15
Deep patch‐wise supervision for presentation attack detection
Published 2022-09-01Subjects: Get full text
Article -
16
Detection algorithm for cache pollution attacks based on node state model in content centric networking
Published 2016-09-01Subjects: Get full text
Article -
17
-
18
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01Subjects: Get full text
Article -
19
Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical Network
Published 2025-01-01Subjects: “…attack detection system…”
Get full text
Article -
20
Time synchronization attack detection for industrial wireless network
Published 2023-06-01Subjects: Get full text
Article