Deep search:Searching for "intrusion detection" in 'ABSTRACTGot 9 items.
index Title
1Intrusion detection using rough set classification
Author(s):ZHANG Lian-hua, ZHANG Guan-hua, YU...  Clicked:12979  Download:5363  Cited:16  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.9 P.1076-1086  DOI:10.1631/jzus.2004.1076
2An immunity-based technique to detect network intrusions
Author(s):PAN Feng, DING Yun-fei, WANG Wei-n...  Clicked:7778  Download:3672  Cited:119  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.5 P.371-377  DOI:10.1631/jzus.2005.A0371
3NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers
Author(s):Yu-jun Xiao, Wen-yuan Xu, Zhen-hua...  Clicked:8915  Download:5055  Cited:0  <Full Text>  <PPT> 4132
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.4 P.519-534  DOI:10.1631/FITEE.1601540
4Cyber security meets artificial intelligence: a survey
Author(s):Jian-hua Li  Clicked:8814  Download:4508  Cited:0  <Full Text>  <PPT> 2661
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1462-1474  DOI:10.1631/FITEE.1800573
5Detection and localization of cyber attacks on water treatment systems: an entropy-based approach
Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, ...  Clicked:9902  Download:13300  Cited:0  <Full Text>  <PPT> 1053
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.4 P.587-603  DOI:10.1631/FITEE.2000546
6Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis
Author(s):Rongkuan MA, Hao ZHENG, Jingyi WAN...  Clicked:8739  Download:15728  Cited:0  <Full Text>  <PPT> 1184
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.3 P.351-360  DOI:10.1631/FITEE.2000709
7CRGT-SA: an interlaced and spatiotemporal deep learning model for network intrusion detection
Author(s):Jue CHEN, Wanxiao LIU, Xihe QIU, W...  Clicked:2375  Download:2807  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1115-1130  DOI:10.1631/FITEE.2400459
8A subspace-based few-shot intrusion detection system for the Internet of Things
Author(s):Zhihui LI, Congyuan XU, Kun DENG, ...  Clicked:1697  Download:2840  Cited:0  <Full Text>  <PPT> 529
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.862-876  DOI:10.1631/FITEE.2400556
9FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ...
Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ...  Clicked:1659  Download:1791  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1164-1179  DOI:10.1631/FITEE.2400932
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE