Author:
Bekshentayeva Kamila,Trajkovic Ljiljana
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Case Study: Understanding Internet Anomalies;2024 IEEE International Symposium on Circuits and Systems (ISCAS);2024-05-19
2. Lightweight Intrusion Detection Using Reservoir Computing;Computers, Materials & Continua;2024
3. Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks;2023 IEEE International Symposium on Circuits and Systems (ISCAS);2023-05-21