-
161
Efficient anomaly detection in tabular cybersecurity data using large language models
Published 2025-01-01Subjects: Get full text
Article -
162
Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN
Published 2013-11-01Subjects: Get full text
Article -
163
Decision-level fusion model of multi-source intrusion detection alerts
Published 2011-01-01Subjects: “…network security…”
Get full text
Article -
164
Design of security verification platform for the integrated space-ground network
Published 2016-08-01Subjects: Get full text
Article -
165
A graph backdoor detection method for data collection scenarios
Published 2025-01-01Subjects: Get full text
Article -
166
-
167
GHSOM intrusion detection based on Dempster-Shafer theory
Published 2015-11-01Subjects: Get full text
Article -
168
Research of Fragment Mechanism Security in IPv6 Network Protocol
Published 2013-10-01Subjects: “…IPv6 network security…”
Get full text
Article -
169
Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
Published 2018-11-01Subjects: Get full text
Article -
170
-
171
Network protocol identification based on active learning and SVM algorithm
Published 2013-10-01Subjects: “…network security…”
Get full text
Article -
172
Detecting DNS-based covert channel on live traffic
Published 2013-05-01Subjects: Get full text
Article -
173
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01Subjects: Get full text
Article -
174
Research on performance optimizations for TCM-KNN network anomaly detection algorithm
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
175
Network anomaly detection based on TCM-KNN and genetic algorithm
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
176
Practice on edge cloud security of telecom operators
Published 2023-04-01Subjects: Get full text
Article -
177
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01Subjects: Get full text
Article -
178
Interestmeasurement and system construction of personal information protectionLI Meiyan
Published 2018-08-01Subjects: Get full text
Article -
179
Research on a dynamic self-learning efficient intrusion detection model
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
180
Principles of Information Security /
Published 2016Subjects: “…Computer networks Security measures. 6783…”
View in OPAC
Book