| index | Title |
| 1 | Intrusion detection using rough set classification Author(s):ZHANG Lian-hua, ZHANG Guan-hua, YU Lang, ZHANG Jie, BAI Ying-cai Clicked:13735 Download:5658 Cited:16 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.9 P.1076-1086 DOI:10.1631/jzus.2004.1076 |
| 2 | An immunity-based technique to detect network intrusions Author(s):PAN Feng, DING Yun-fei, WANG Wei-nong Clicked:8198 Download:3976 Cited:119 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.5 P.371-377 DOI:10.1631/jzus.2005.A0371 |
| 3 | A new data normalization method for unsupervised anomaly intrusion detection Author(s):Long-zheng Cai, Jian Chen, Yun Ke, Tao Chen, Zhi-gang Li Clicked:10633 Download:4350 Cited:2 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.10 P.778-784 DOI:10.1631/jzus.C0910625 |
| 4 | Detection and localization of cyber attacks on water treatment systems: an entropy-based approach Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI Clicked:10896 Download:14473 Cited:0 <Full Text> <PPT> 1275 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.4 P.587-603 DOI:10.1631/FITEE.2000546 |
| 5 | CRGT-SA: an interlaced and spatiotemporal deep learning model for network intrusion detection Author(s):Jue CHEN, Wanxiao LIU, Xihe QIU, Wenjing LV, Yujie XIONG Clicked:3224 Download:4591 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1115-1130 DOI:10.1631/FITEE.2400459 |
| 6 | A subspace-based few-shot intrusion detection system for the Internet of Things Author(s):Zhihui LI, Congyuan XU, Kun DENG, Chunyuan LIU Clicked:2489 Download:4689 Cited:0 <Full Text> <PPT> 750 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.862-876 DOI:10.1631/FITEE.2400556 |
| 7 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the Internet of Things Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu CHENG, Roshan KUMAR Clicked:2450 Download:3106 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |
