Author:
Souri Alireza,Norouzi Monire,Alsenani Yousef
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference45 articles.
1. Song, L., Rho, S.: Hidden target recognition method for high-speed network security threats based on attack graph theory. J. High Speed Netw. 10, 1–14 (2023)
2. Pour, M.S., et al.: A comprehensive survey of recent internet measurement techniques for cyber security. Comput. Sec. 27, 103123 (2023)
3. Bhuvaneshwari, B., et al.: Artificial intelligence enabled luong attention and Hosmer Lemeshow regression window-based attack detection in 6G. Int. J. Commun. Syst. 36, e5571 (2023)
4. Alhanaya, M., Al-Shqeerat, K.: Developing an integrated framework for securing internet of things traffic in smart cities using machine learning techniques. Appl. Sci. (2023). https://doi.org/10.3390/app13169476
5. Rajarao, B., Sreenivasulu, M.: FD-DBN: flow directed deep belief network for accurate anomaly detection in cloud computing. Int. J. Commun. Syst. 10, e5592 (2023)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献