
| index | Title |
| 1 | Intrusion detection using rough set classification Author(s):ZHANG Lian-hua, ZHANG Guan-hua, YU... Clicked:13780 Download:5659 Cited:16 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.9 P.1076-1086 DOI:10.1631/jzus.2004.1076 |
| 2 | An immunity-based technique to detect network intrusions Author(s):PAN Feng, DING Yun-fei, WANG Wei-n... Clicked:8221 Download:3977 Cited:119 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.5 P.371-377 DOI:10.1631/jzus.2005.A0371 |
| 3 | A new data normalization method for unsupervised anomaly intrusion detection Author(s):Long-zheng Cai, Jian Chen, Yun Ke,... Clicked:10647 Download:4351 Cited:2 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.10 P.778-784 DOI:10.1631/jzus.C0910625 |
| 4 | NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers Author(s):Yu-jun Xiao, Wen-yuan Xu, Zhen-hua... Clicked:9532 Download:5829 Cited:0 <Full Text> <PPT> 4372 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.4 P.519-534 DOI:10.1631/FITEE.1601540 |
| 5 | Cyber security meets artificial intelligence: a survey Author(s):Jian-hua Li Clicked:9459 Download:5232 Cited:0 <Full Text> <PPT> 2897 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1462-1474 DOI:10.1631/FITEE.1800573 |
| 6 | Detection and localization of cyber attacks on water treatment systems: an entropy-based approach Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, ... Clicked:10916 Download:14483 Cited:0 <Full Text> <PPT> 1278 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.4 P.587-603 DOI:10.1631/FITEE.2000546 |
| 7 | Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis Author(s):Rongkuan MA, Hao ZHENG, Jingyi WAN... Clicked:9413 Download:16994 Cited:0 <Full Text> <PPT> 1498 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.3 P.351-360 DOI:10.1631/FITEE.2000709 |
| 8 | CRGT-SA: an interlaced and spatiotemporal deep learning model for network intrusion detection Author(s):Jue CHEN, Wanxiao LIU, Xihe QIU, W... Clicked:3245 Download:4619 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1115-1130 DOI:10.1631/FITEE.2400459 |
| 9 | A subspace-based few-shot intrusion detection system for the Internet of Things Author(s):Zhihui LI, Congyuan XU, Kun DENG, ... Clicked:2516 Download:4715 Cited:0 <Full Text> <PPT> 751 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.862-876 DOI:10.1631/FITEE.2400556 |
| 10 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ... Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ... Clicked:2466 Download:3124 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |