为了提供给您更好的使用体验,请启用此功能。';window.onload=function(){1==navigator.cookieEnabled||(document.body.insertAdjacentHTML("beforeend",ck_html),window.onscroll=function(i){console.log(i),document.body.setAttribute("style","position:fixed")})}
1. Detecting advanced persistent threats via casual graph neural network NSTL国家科技图书文献中心
Zhida Guo | Xiaoli Li... - 《Fourth International Conference on Network Communication and Information Security (ICNCIS 2024)》 - International Conference on Network Communication and Information Security - 2025, - 135160Z.1~135160Z.7 - 共7页
2. Anomaly Detection for Advanced Persistent Threats With Graph Node Embedding NSTL国家科技图书文献中心
ZHE-HENG PENG | CHANG-ZHEN HU... - 《Journal of information science and engineering》 - 2025,41(3) - 713~728 - 共16页
3. A Cyber-Risk Management Schema for Classifying Literature on Advanced Persistent Threats NSTL国家科技图书文献中心
Rajesh Kumar | Swapnil Pandey - 《2025 17th International Conference on Communication Systems and Networks》 - International Conference on Communication Systems and Networks - 2025, - 1317~1322 - 共6页
4. Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction NSTL国家科技图书文献中心
Abdullah Al Mamun | Harith Al-Sahaf... - 《Computers & Security》 - 2025,149(Feb.) - 104185.1~104185.18 - 共18页
5. HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT NSTL国家科技图书文献中心
Kumar Saurabh | Vaidik Sharma... - 《Arabian journal for science and engineering》 - 2025,50(2) - 1307~1327 - 共21页
6. Defending Against APT Attacks in Robots: A Multi-phase Game-Theoretical Approach NSTL国家科技图书文献中心
Asim Zoulkarni | Sai Sandeep Damera... - 《Decision and Game Theory for Security》 - International Conference on Decision and Game Theory for Security - 2025, - 287~305 - 共19页
7. Analyzing Disk-Minimal Malware in Phishing Attacks: A Forensic Methodology for Modern Cyber Threats NSTL国家科技图书文献中心
P Barker | DA Orr - 《Journal of Information Warfare》 - 2025,24(1) - 82~104 - 共23页
8. Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plants NSTL国家科技图书文献中心
Gabriela Ahmadi-Assa... | Haider Al-Khateeb... - 《International journal of electronic security and digital forensics》 - 2025,17(1/2) - 1~29 - 共29页
9. The APT family classification system based on APT call sequences and attention mechanism NSTL国家科技图书文献中心
Zeng Shou | Yue-bin Di... - 《International journal of information and computer security》 - 2025,26(1/2) - 22~40 - 共19页
10. AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels NSTL国家科技图书文献中心
Thi Quynh Nguyen | Romain Laborde... - 《Annals of telecommunications》 - 2025,80(3/4) - 227~249 - 共23页 - 被引量:1
服务站
成员单位
友情链接