Author:
Kim Han-Sung,Cha Sung-Deok
Subject
Law,General Computer Science
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detecting Masquerading Traitors from Process Visualization of Computer Usage;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01
2. Network Intrusion Detection Empowered with Federated Machine Learning;2023-09-19
3. Real-time anomaly attack detection based on an improved variable length model;Journal of Computational Methods in Sciences and Engineering;2023-05-30
4. Addressing insider attacks via forensic-ready risk management;Journal of Information Security and Applications;2023-03
5. Honeypot-Assisted Masquerade Detection with Character-Level Machine Learning;2023 15th International Conference on Knowledge and Smart Technology (KST);2023-02-21