Cited By
View all- Wu LXie YLi JFeng DLiang JWu Y(2025)Angus: efficient active learning strategies for provenance based intrusion detectionCybersecurity10.1186/s42400-024-00311-y8:1Online publication date: 27-Jan-2025
- Makris IKarampasi ARadoglou-Grammatikis PEpiskopos NIturbe ERios EPiperigkos NLalos AXenakis CLagkas TArgyriou VSarigiannidis P(2025)A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutionsComputer Science Review10.1016/j.cosrev.2024.10071756(100717)Online publication date: May-2025
- Zhang YDong HNottingham ABuchanan MBrown DSun Y(2023)Global Analysis with Aggregation-based Beaconing Detection across Large Campus NetworksProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627126(565-579)Online publication date: 4-Dec-2023
- Show More Cited By