
| index | Title |
| 1 | Intrusion detection using rough set classification Author(s):ZHANG Lian-hua, ZHANG Guan-hua, YU... Clicked:13572 Download:5638 Cited:16 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.9 P.1076-1086 DOI:10.1631/jzus.2004.1076 |
| 2 | An immunity-based technique to detect network intrusions Author(s):PAN Feng, DING Yun-fei, WANG Wei-n... Clicked:8119 Download:3947 Cited:119 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.5 P.371-377 DOI:10.1631/jzus.2005.A0371 |
| 3 | NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers Author(s):Yu-jun Xiao, Wen-yuan Xu, Zhen-hua... Clicked:9464 Download:5711 Cited:0 <Full Text> <PPT> 4329 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.4 P.519-534 DOI:10.1631/FITEE.1601540 |
| 4 | Cyber security meets artificial intelligence: a survey Author(s):Jian-hua Li Clicked:9392 Download:5150 Cited:0 <Full Text> <PPT> 2874 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1462-1474 DOI:10.1631/FITEE.1800573 |
| 5 | Detection and localization of cyber attacks on water treatment systems: an entropy-based approach Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, ... Clicked:10506 Download:14378 Cited:0 <Full Text> <PPT> 1238 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.4 P.587-603 DOI:10.1631/FITEE.2000546 |
| 6 | Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis Author(s):Rongkuan MA, Hao ZHENG, Jingyi WAN... Clicked:9342 Download:16897 Cited:0 <Full Text> <PPT> 1455 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.3 P.351-360 DOI:10.1631/FITEE.2000709 |
| 7 | CRGT-SA: an interlaced and spatiotemporal deep learning model for network intrusion detection Author(s):Jue CHEN, Wanxiao LIU, Xihe QIU, W... Clicked:3102 Download:4295 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1115-1130 DOI:10.1631/FITEE.2400459 |
| 8 | A subspace-based few-shot intrusion detection system for the Internet of Things Author(s):Zhihui LI, Congyuan XU, Kun DENG, ... Clicked:2411 Download:4397 Cited:0 <Full Text> <PPT> 718 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.862-876 DOI:10.1631/FITEE.2400556 |
| 9 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ... Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ... Clicked:2401 Download:2910 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |