Author:
Yang Jianhua,Zhang Yongzhong,King Robert,Tolbert Tim
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Remote Packet Monitoring: Real-Time Network Analysis from Anywhere;2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT);2024-01-04
2. An Effective Technique to Automatically Detect and Neutralize Rogue DHCP Server;2023 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD);2023-09-21
3. Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection;Sensors;2021-11-10
4. Mining Network Traffic with the
k
-Means Clustering Algorithm for Stepping-Stone Intrusion Detection;Wireless Communications and Mobile Computing;2021-03-03
5. Digital deception in cybersecurity: an information behaviour lens;Proceedings of ISIC: the information behaviour conference Pretoria, South Africa, 28th September to 1st October, 2020;2020-12-15