Author:
Sezari Behrooz,Moller Dietmar P. F.,Deutschmann Andreas
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset;2024 15th International Conference on Information and Communication Systems (ICICS);2024-08-13
2. An Optimized Hybrid Deep Intrusion Detection Model (HD-IDM) for Enhancing Network Security;Mathematics;2023-10-31
3. Research and Analysis of Different Real Cases, with use AAI;2023 16th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS);2023-10-25
4. Intrusive Detection Techniques Utilizing Machine Learning, Deep Learning, and Anomaly-based Approaches;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22
5. Artificial Intelligence Techniques in Cybersecurity Management;Advanced Sciences and Technologies for Security Applications;2023