
| index | Title |
| 1 | Intrusion detection using rough set classification Author(s):ZHANG Lian-hua, ZHANG Guan-hua, YU... Clicked:13737 Download:5658 Cited:16 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.9 P.1076-1086 DOI:10.1631/jzus.2004.1076 |
| 2 | An immunity-based technique to detect network intrusions Author(s):PAN Feng, DING Yun-fei, WANG Wei-n... Clicked:8199 Download:3976 Cited:119 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.5 P.371-377 DOI:10.1631/jzus.2005.A0371 |
| 3 | NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers Author(s):Yu-jun Xiao, Wen-yuan Xu, Zhen-hua... Clicked:9519 Download:5819 Cited:0 <Full Text> <PPT> 4370 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.4 P.519-534 DOI:10.1631/FITEE.1601540 |
| 4 | Cyber security meets artificial intelligence: a survey Author(s):Jian-hua Li Clicked:9449 Download:5226 Cited:0 <Full Text> <PPT> 2897 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1462-1474 DOI:10.1631/FITEE.1800573 |
| 5 | Detection and localization of cyber attacks on water treatment systems: an entropy-based approach Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, ... Clicked:10896 Download:14473 Cited:0 <Full Text> <PPT> 1275 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.4 P.587-603 DOI:10.1631/FITEE.2000546 |
| 6 | Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis Author(s):Rongkuan MA, Hao ZHENG, Jingyi WAN... Clicked:9405 Download:16982 Cited:0 <Full Text> <PPT> 1495 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.3 P.351-360 DOI:10.1631/FITEE.2000709 |
| 7 | CRGT-SA: an interlaced and spatiotemporal deep learning model for network intrusion detection Author(s):Jue CHEN, Wanxiao LIU, Xihe QIU, W... Clicked:3225 Download:4591 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1115-1130 DOI:10.1631/FITEE.2400459 |
| 8 | A subspace-based few-shot intrusion detection system for the Internet of Things Author(s):Zhihui LI, Congyuan XU, Kun DENG, ... Clicked:2493 Download:4689 Cited:0 <Full Text> <PPT> 750 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.862-876 DOI:10.1631/FITEE.2400556 |
| 9 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ... Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ... Clicked:2451 Download:3106 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |