Cited By
View all- Wang YSun JYang FLu X(2024)Data Interaction Security Monitoring Technology Based on Behavior Graph RepresentationProceedings of the 2024 3rd International Conference on Cryptography, Network Security and Communication Technology10.1145/3673277.3673283(30-34)Online publication date: 19-Jan-2024
- Sivakumar GAmsaveni KR CSrirengaNachiyar VVaitheki SMarichamy P(2024)Predictive Modeling for Network Anomaly Detection Using Machine Learning2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS)10.1109/ICSCSS60660.2024.10625631(965-970)Online publication date: 10-Jul-2024
- Kim K(2024)Fuzzy anomaly scores for Isolation ForestApplied Soft Computing10.1016/j.asoc.2024.112193166(112193)Online publication date: Nov-2024
- Show More Cited By