Advanced Search



3 results found in all.
index Title
1An immunity-based technique to detect network intrusions
Author(s):PAN Feng, DING Yun-fei, WANG Wei-nong  Clicked:7003  Download:3425  Cited:119  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.5 P.371-377  DOI:10.1631/jzus.2005.A0371
2Detection and localization of cyber attacks on water treatment systems: an entropy-based approach
Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI  Clicked:8699  Download:11780  Cited:0  <Full Text>  <PPT> 748
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.4 P.587-603  DOI:10.1631/FITEE.2000546
3A subspace-based few-shot intrusion detection system for the Internet of Things
Author(s):Zhihui LI, Congyuan XU, Kun DENG, Chunyuan LIU  Clicked:723  Download:1262  Cited:0  <Full Text>  <PPT> 322
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.862-876  DOI:10.1631/FITEE.2400556
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE