Author:
Bhukya Wilson Naik,Kumar G Suresh,Negi Atul
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AI And ML Applications in the Computing Systems;2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC);2023-12-19
2. Review of Potential Attacks on Robotic Swarms;Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016;2017-08-23
3. Fuzzy approach for intrusion detection based on user’s commands;Soft Computing;2015-04-03
4. Masquerade Detection Based Upon GUI User Profiling in Linux Systems;Lecture Notes in Computer Science