NIDS-CNNLSTM: Network Intrusion Detection Classification Model Based on Deep Learning.
IEEE Access, 2023
Perception Mining of Network Protocol's Stealth Attack Behaviors.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Mining and Utilizing Network Protocol's Stealth Attack Behaviors.
Proceedings of the Advances on P2P, 2018
Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior.
Int. J. Bus. Data Commun. Netw., 2017
Hybrid Analysis for Mining Network Protocol's Hidden Behavior.
Proceedings of the 10th International Conference on Complex, 2016
Instruction Sequences Clustering and Analysis of Network Protocol's Dormant Behaviors.
Proceedings of the Advances on P2P, 2016
Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior.
J. Interconnect. Networks, 2015
Instruction Clustering Analysis for Network Protocol's Abnormal Behavior.
Proceedings of the 10th International Conference on P2P, 2015
Analyze Network Protocol's Hidden Behavior.
Proceedings of the 10th International Conference on P2P, 2015