相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection
Xiaorui Zhang et al.
COMPUTER SYSTEMS SCIENCE AND ENGINEERING (2022)
An Efficient Network Intrusion Detection and Classification System
Iftikhar Ahmad et al.
MATHEMATICS (2022)
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection
Xiaorui Zhang et al.
CMC-COMPUTERS MATERIALS & CONTINUA (2022)
Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
Muhammad Nadeem et al.
IEEE ACCESS (2021)
Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: A differential e-epidemic model
Yerra Shankar Rao et al.
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2020)
Clustered negative selection algorithm and fruit fly optimization for email spam detection
Ramdane Chikh et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
Network Intrusion Detection for IoT Security Based on Learning Techniques
Nadia Chaabouni et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm
Yonghao Gu et al.
IEEE ACCESS (2019)
A novel lightweight URL phishing detection system using SVM and similarity index
Mouad Zouina et al.
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2017)
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
Saman Taghavi Zargar et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)