Author:
Belenko Viacheslav,Chernenko Valery,Kalinin Maxim,Krundyshev Vasiliy
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detecting the undetectable: GAN-based strategies for network intrusion detection;International Journal of Information Technology;2024-09-13
2. Exploring the Role of Generative Adversarial Networks in Cybersecurity;Advances in Information Security, Privacy, and Ethics;2024-05-16
3. Empowering IoT with Generative AI: Applications, Case Studies, and Limitations;IEEE Internet of Things Magazine;2024-05
4. Tuning of Machine Learning Model to Strengthen the Digital Ecosystem of Vehicular Ad-hoc Networks;2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO);2024-03-14
5. Network Anomaly Based Detection Using Multivariate Correlation Analysis Technique;2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS);2023-12-14