• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4752771)   Today's Articles (363)
For: Aleroud A, Karabatis G. Contextual information fusion for intrusion detection: a survey and taxonomy. Knowl Inf Syst 2017. [DOI: 10.1007/s10115-017-1027-3] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
Number Cited by Other Article(s)
1
Sánchez-García ID, Feliu Gilabert TS, Calvo-Manzano JA. Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103170] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/18/2023]
2
Thill M, Konen W, Wang H, Bäck T. Temporal convolutional autoencoder for unsupervised anomaly detection in time series. Appl Soft Comput 2021. [DOI: 10.1016/j.asoc.2021.107751] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
3
PRIPRO—Privacy Profiles: User Profiling Management for Smart Environments. ELECTRONICS 2020. [DOI: 10.3390/electronics9091519] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
4
A Systematic Review of Defensive and Offensive Cybersecurity with Machine Learning. APPLIED SCIENCES-BASEL 2020. [DOI: 10.3390/app10175811] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
5
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. Symmetry (Basel) 2019. [DOI: 10.3390/sym11010078] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
6
Token based Detection and Neural Network based Reconstruction framework against code injection vulnerabilities. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2018. [DOI: 10.1016/j.jisa.2018.05.005] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
7
Wu H, Wang Z. Multi-source fusion-based security detection method for heterogeneous networks. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.01.003] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
8
Al-Utaibi KA, El-Alfy ESM. Intrusion detection taxonomy and data preprocessing mechanisms. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2018. [DOI: 10.3233/jifs-169432] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA