Search Results - Anomaly detection and rules-based intrusion detection techniques*
-
1
Authors:
Source: Turkish Journal of Engineering (TUJE); 2025, Vol. 9 Issue 3, p535-543, 9p
-
2
Authors: et al.
Source: EURASIP Journal on Information Security; 10/21/2025, Vol. 2025 Issue 1, p1-23, 23p
-
3
Authors: et al.
Source: AIMS Mathematics; 2025, Vol. 10 Issue 10, p1-22, 22p
-
4
-
5
Authors: et al.
Source: Cluster Computing; Dec2025, Vol. 28 Issue 16, p1-18, 18p
-
6
Authors:
Source: International Journal of Intelligent Engineering & Systems; 2025, Vol. 18 Issue 8, p607-630, 24p
-
7
Authors:
Source: University of Danang - Journal of Science & Technology; 2025, Vol. 23 Issue 9C, p7-11, 5p
-
8
Authors: Abdulwahid, Abdulwahid Al
Source: Computers, Materials & Continua; 2025, Vol. 85 Issue 1, p1751-1777, 27p
-
9
Authors: et al.
Source: Computers (2073-431X); Jul2025, Vol. 14 Issue 7, p281, 46p
-
10
Authors:
Source: International Journal of Environmental Sciences (2229-7359); 2025 Special Issue, Vol. 11, p1216-1223, 8p
-
11
Authors: Sayghe, Ali
Source: Sensors (14248220); Aug2025, Vol. 25 Issue 16, p4963, 20p
-
12
Authors: et al.
Source: Computers, Materials & Continua; 2025, Vol. 84 Issue 3, p4699-4727, 29p
-
13
Authors:
Source: International Journal of Intelligent Engineering & Systems; 2025, Vol. 18 Issue 8, p707-728, 22p
-
14
Authors: et al.
Source: Scientific Reports; 10/17/2025, Vol. 15 Issue 1, p1-16, 16p
-
15
Authors: et al.
Source: Cluster Computing; Nov2025, Vol. 28 Issue 12, p1-42, 42p
-
16
Authors:
Source: International Journal of Advances in Intelligent Informatics; Aug2025, Vol. 11 Issue 3, p459-479, 21p
-
17
Authors: et al.
Source: Future Internet; Nov2025, Vol. 17 Issue 11, p482, 24p
-
18
Authors: et al.
Source: Sensors (14248220); Oct2025, Vol. 25 Issue 20, p6261, 36p
-
19
Authors: et al.
Source: Cluster Computing; Nov2025, Vol. 28 Issue 14, p1-31, 31p
-
20
Authors: et al.
Source: Computers (2073-431X); Oct2025, Vol. 14 Issue 10, p424, 24p
Full Text Finder
Nájsť tento článok vo Web of Science