Publisher
Springer International Publishing
Reference17 articles.
1. Cardona-Rivera, R.E., Young, R.M.: Toward combining domain theory and recipes in plan recognition. In: Workshops at the Thirty-First AAAI Conference on Artificial Intelligence (2017)
2. Xu, P., Zhang, Y., Eckert, C., Zarras, A.: HawkEye: cross-platform malware detection with representation learning on graphs. In International Conference on Artificial Neural Networks, Springer, Cham, pp 127–138 (2021)
3. Zolkipli, M.F., Jantan, A.: Malware behavior analysis: Learning and understanding current malware threats. In: 2010 Second International Conference on Network Applications, Protocols and Services, IEEE, pp. 218–221 (2010)
4. Kindervag, J.: No more chewy centers: the zero trust model of information security. Forrester Research Inc., (2016)
5. Cetinkaya, A., Ishii, H., Hayakawa, T.: An overview on denial-of-service attacks in control systems: attack models and security analyses. Entropy 21(2), 210 (2019)