Author:
Heberlein L.T.,Dias G.V.,Levitt K.N.,Mukherjee B.,Wood J.,Wolber D.
Cited by
105 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An investigation of malware and the systems used to detect and identify malware;2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP);2024-07-11
2. Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review;ACM Computing Surveys;2024-06-22
3. A Survey on Machine Learning Techniques for Detecting, Mitigating, and Preventing Intrusions;2023 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS);2023-11-01
4. Comparison of ML-based One-Stage and Two-Stage NIDS Models;2023 16th International Conference on Information Security and Cryptology (ISCTürkiye);2023-10-18
5. Intrusion Detection Method Based on Autoencoder Generative Adversarial Network;2023 5th International Symposium on Robotics & Intelligent Manufacturing Technology (ISRIMT);2023-09-22