Author:
Yolacan Esra N.,Dy Jennifer G.,Kaeli David R.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhanced Security for an IoT Devices in Cyber-Physical System against Cyber Attacks;2022 International Conference for Advancement in Technology (ICONAT);2022-01-21
2. Using a Neural Network to Detect Anomalies Given an N-gram Profile;Lecture Notes in Computer Science;2021
3. CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications;Annual Computer Security Applications Conference;2020-12-07
4. A p2p environment to validate ensemble-based approaches in the cybersecurity domain;2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP);2020-03
5. SON KULLANICILAR İÇİN ANOMALİ SALDIRI TESPİT SİSTEMLERİ;Eskişehir Osmangazi Üniversitesi Mühendislik ve Mimarlık Fakültesi Dergisi;2019-12-15