Publisher
Springer Nature Switzerland
Reference23 articles.
1. Radoglou-Grammatikis, P., et al.: Modeling, detecting, and mitigating threats against industrial healthcare systems: a combined software defined networking and reinforcement learning approach. IEEE Trans. Industr. Inf. 18(3), 2041–2052 (2022)
2. Aldweesh, A., Derhab, A., and Emam, A.Z.: Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Know.-Based Syst. 189 (2020)
3. Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appli. Sci. 9(20) (2019)
4. Vo, H.V., Du, H.P., Nguyen, H.N.: Ai-powered intrusion detection in large-scale traffic networks based on flow sensing strategy and parallel deep analysis. J. Netw. Comput. Appl. 220, 103735 (2023)
5. Qin-cui, F., Zi-ying, L., Ke-jia, F.: Implementation of iec60870-5-104 protocol based on finite state machines. In: 2009 International Conference on Sustainable Power Generation and Supply, pp. 1–5, (2009)