Author:
Mahmoud Loreen,Praveen Raja
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite Used;2022 IEEE International Carnahan Conference on Security Technology (ICCST);2022-09-07
2. A Comparative Study of LAD, CNN and DNN for Detecting Intrusions;Intelligent Data Engineering and Automated Learning – IDEAL 2022;2022