Cited By
View all- Shen SCai CLi ZShen YWu GYu S(2024)Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacksApplied Soft Computing10.1016/j.asoc.2023.111080150:COnline publication date: 12-Apr-2024
- Zhang YDong HNottingham ABuchanan MBrown DSun Y(2023)Global Analysis with Aggregation-based Beaconing Detection across Large Campus NetworksProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627126(565-579)Online publication date: 4-Dec-2023
- Deng XZhu JPei XZhang LLing ZXue K(2023)Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2022.321380720:1(684-696)Online publication date: 1-Mar-2023
- Show More Cited By