为了提供给您更好的使用体验,请启用此功能。';window.onload=function(){1==navigator.cookieEnabled||(document.body.insertAdjacentHTML("beforeend",ck_html),window.onscroll=function(i){console.log(i),document.body.setAttribute("style","position:fixed")})}
1. Detecting advanced persistent threats via casual graph neural network NSTL国家科技图书文献中心
Zhida Guo | Xiaoli Li... - 《Fourth International Conference on Network Communication and Information Security (ICNCIS 2024)》 - International Conference on Network Communication and Information Security - 2025, - 135160Z.1~135160Z.7 - 共7页
2. Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction NSTL国家科技图书文献中心
Abdullah Al Mamun | Harith Al-Sahaf... - 《Computers & Security》 - 2025,149(Feb.) - 104185.1~104185.18 - 共18页
3. HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT NSTL国家科技图书文献中心
Kumar Saurabh | Vaidik Sharma... - 《Arabian journal for science and engineering》 - 2025,50(2) - 1307~1327 - 共21页
4. Defending Against APT Attacks in Robots: A Multi-phase Game-Theoretical Approach NSTL国家科技图书文献中心
Asim Zoulkarni | Sai Sandeep Damera... - 《Decision and Game Theory for Security》 - International Conference on Decision and Game Theory for Security - 2025, - 287~305 - 共19页
5. Analyzing Disk-Minimal Malware in Phishing Attacks: A Forensic Methodology for Modern Cyber Threats NSTL国家科技图书文献中心
P Barker | DA Orr - 《Journal of Information Warfare》 - 2025,24(1) - 82~104 - 共23页
6. Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plants NSTL国家科技图书文献中心
Gabriela Ahmadi-Assa... | Haider Al-Khateeb... - 《International journal of electronic security and digital forensics》 - 2025,17(1/2) - 1~29 - 共29页
7. The APT family classification system based on APT call sequences and attention mechanism NSTL国家科技图书文献中心
Zeng Shou | Yue-bin Di... - 《International journal of information and computer security》 - 2025,26(1/2) - 22~40 - 共19页
8. AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels NSTL国家科技图书文献中心
Thi Quynh Nguyen | Romain Laborde... - 《Annals of telecommunications》 - 2025,80(3/4) - 227~249 - 共23页 - 被引量:1
9. Entity and relation extractions for threat intelligence knowledge graphs NSTL国家科技图书文献中心
Inoussa Mouiche | Sherif Saad - 《Computers & Security》 - 2025,148(Jan.) - 104120.1~104120.13 - 共13页
10. Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments NSTL国家科技图书文献中心
Mukund Bhole | Thilo Sauter... - 《IEEE Open Journal of the Industrial Electronics Society》 - 2025,6 - 145~157 - 共13页
服务站
成员单位
友情链接