
| index | Title |
| 1 | A new data normalization method for unsupervised anomaly intrusion detection Author(s):Long-zheng Cai, Jian Chen, Yun Ke,... Clicked:10624 Download:4345 Cited:2 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.10 P.778-784 DOI:10.1631/jzus.C0910625 |
| 2 | Botnet detection techniques: review, future trends, and issues Author(s):Ahmad Karim, Rosli Bin Salleh, Muh... Clicked:23093 Download:27168 Cited:10 <Full Text> <PPT> 3735 Journal of Zhejiang University Science C 2014 Vol.15 No.11 P.943-983 DOI:10.1631/jzus.C1300242 |
| 3 | NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers Author(s):Yu-jun Xiao, Wen-yuan Xu, Zhen-hua... Clicked:9502 Download:5774 Cited:0 <Full Text> <PPT> 4356 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.4 P.519-534 DOI:10.1631/FITEE.1601540 |
| 4 | FAAD: an unsupervised fast and accurate anomaly detection method for a multi-dimensional sequence over data... Author(s):Bin Li, Yi-jie Wang, Dong-sheng Ya... Clicked:8472 Download:4281 Cited:0 <Full Text> <PPT> 2494 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.3 P.388-404 DOI:10.1631/FITEE.1800038 |
| 5 | Adaptive and augmented active anomaly detection on dynamic network traffic streams Author(s):Bin LI, Yijie WANG, Li CHENG Clicked:3993 Download:3199 Cited:0 <Full Text> <PPT> 468 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.3 P.446-460 DOI:10.1631/FITEE.2300244 |
| 6 | Deep anomaly detection of temporal heterogeneous data in AIOps: a survey Author(s):Jiayi GUI, Zhongnan MA, Hao ZHOU, ... Clicked:2505 Download:5606 Cited:0 <Full Text> <PPT> 483 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1551-1576 DOI:10.1631/FITEE.2400467 |