Deep search:Searching for "intrusion detection" in 'ABSTRACT and KEYWORDGot 5 items.
index Title
1Intrusion detection using rough set classification
Author(s):ZHANG Lian-hua, ZHANG Guan-hua, YU...  Clicked:8457  Download:2463  Cited:16  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.9 P.1076~1086  DOI:10.1631/jzus.2004.1076
2An immunity-based technique to detect network intrusions
Author(s):PAN Feng, DING Yun-fei, WANG Wei-n...  Clicked:3799  Download:1293  Cited:119  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.5 P.371~377  DOI:10.1631/jzus.2005.A0371
3A new data normalization method for unsupervised anomaly intrusion detection
Author(s):Long-zheng Cai, Jian Chen, Yun Ke,...  Clicked:3566  Download:1410  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.778-784  DOI:10.1631/jzus.C0910625
4NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers
Author(s):Yu-jun Xiao, Wen-yuan Xu, Zhen-hua...  Clicked:1909  Download:831  Cited:0  <Full Text>  <PPT> 269
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.4 P.519-534  DOI:10.1631/FITEE.1601540
5Cyber security meets artificial intelligence: a survey
Author(s):Jian-hua Li  Clicked:1148  Download:696  Cited:0  <Full Text>  <PPT> 187
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1462-1474  DOI:10.1631/FITEE.1800573
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE