Author:
Shiri Farzaneh Izak,Shanmugam Bharanidharan,Idris Norbik Bashah
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Malware Classification using LSTM-CF Framework for Disk Forensic Analysis;2024 IEEE International Conference on Contemporary Computing and Communications (InC4);2024-03-15
2. Simulation of IoT-based Smart City of Darwin: Leading Cyber Attacks and Prevention Techniques;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06
3. Network intrusion detection based on n-gram frequency and time-aware transformer;Computers & Security;2023-05
4. Obtrusion Detection Using Hybrid Cloud Models;Proceedings of the Third International Conference on Information Management and Machine Intelligence;2022-08-04
5. Advanced Signature-Based Intrusion Detection System;Intelligent Communication Technologies and Virtual Mobile Networks;2022-07-20