
| index | Title |
| 1 | A new data normalization method for unsupervised anomaly intrusion detection Author(s):Long-zheng Cai, Jian Chen, Yun Ke,... Clicked:10604 Download:4336 Cited:2 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.10 P.778-784 DOI:10.1631/jzus.C0910625 |
| 2 | Botnet detection techniques: review, future trends, and issues Author(s):Ahmad Karim, Rosli Bin Salleh, Muh... Clicked:23046 Download:27055 Cited:10 <Full Text> <PPT> 3722 Journal of Zhejiang University Science C 2014 Vol.15 No.11 P.943-983 DOI:10.1631/jzus.C1300242 |
| 3 | NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers Author(s):Yu-jun Xiao, Wen-yuan Xu, Zhen-hua... Clicked:9470 Download:5729 Cited:0 <Full Text> <PPT> 4339 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.4 P.519-534 DOI:10.1631/FITEE.1601540 |
| 4 | FAAD: an unsupervised fast and accurate anomaly detection method for a multi-dimensional sequence over data... Author(s):Bin Li, Yi-jie Wang, Dong-sheng Ya... Clicked:8439 Download:4240 Cited:0 <Full Text> <PPT> 2480 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.3 P.388-404 DOI:10.1631/FITEE.1800038 |
| 5 | Adaptive and augmented active anomaly detection on dynamic network traffic streams Author(s):Bin LI, Yijie WANG, Li CHENG Clicked:3929 Download:3155 Cited:0 <Full Text> <PPT> 461 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.3 P.446-460 DOI:10.1631/FITEE.2300244 |
| 6 | Deep anomaly detection of temporal heterogeneous data in AIOps: a survey Author(s):Jiayi GUI, Zhongnan MA, Hao ZHOU, ... Clicked:2466 Download:5473 Cited:0 <Full Text> <PPT> 441 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1551-1576 DOI:10.1631/FITEE.2400467 |