相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Dynamic management of a deep learning-based anomaly detection system for 5G networks
Lorenzo Fernandez Maimo et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
OpenICE medical device interoperability platform overview and requirement analysis
David Arney et al.
BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK (2018)
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics
Krzysztof Cabaj et al.
COMPUTERS & ELECTRICAL ENGINEERING (2018)
Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory
Aviad Cohen et al.
EXPERT SYSTEMS WITH APPLICATIONS (2018)
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
Rodrigo Roman et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Cybersecurity in healthcare: A narrative review of trends, threats and ways forward
Lynne Coventry et al.
MATURITAS (2018)
OpenICE medical device interoperability platform overview and requirement analysis
David Arney et al.
BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK (2018)
Machine Learning-Based Detection of Ransomware Using SDN
Greg Cusack et al.
PROCEEDINGS OF THE 2018 ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFVSEC'18) (2018)
Obstacles in Data Distribution Service Middleware: A Systematic Review
Omer Koksal et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware
Qian Chen et al.
2017 16TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA) (2017)
Research Directions for Cyber Physical Systems in Wireless and Mobile Healthcare
John A. Stankovic
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS (2017)
On Threat Modeling and Mitigation of Medical Cyber-Physical Systems
Hussain Almohri et al.
2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE) (2017)
Comprehensive Survey on Petya Ransomware Attack
Jagmeet Singh Aidan et al.
2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS) (2017)
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall
Krzysztof Cabaj et al.
IEEE NETWORK (2016)
Evaluation of machine learning classifiers for mobile malware detection
Fairuz Amalina Narudin et al.
SOFT COMPUTING (2016)
Cloud-based Secure Logger For Medical Devices
Hung Nguyen et al.
2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE) (2016)
Medical Internet of Things and Big Data in Healthcare
Dimiter V. Dimitrov
HEALTHCARE INFORMATICS RESEARCH (2016)
Toward an SDN-Enabled NFV Architecture
Jon Matias et al.
IEEE COMMUNICATIONS MAGAZINE (2015)
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem
Patricia A. H. Williams et al.
MEDICAL DEVICES-EVIDENCE AND RESEARCH (2015)
Model-Driven Safety Analysis of Closed-Loop Medical Systems
Miroslav Pajic et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
Isolation-Based Anomaly Detection
Fei Tony Liu et al.
ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA (2012)
Estimating the support of a high-dimensional distribution
B Schölkopf et al.
NEURAL COMPUTATION (2001)
LOF: Identifying density-based local outliers
MM Breunig et al.
SIGMOD RECORD (2000)