The following publications are possibly variants of this publication:
- Deep-Reinforcement-Learning-Based Intrusion Detection in Aerial Computing NetworksJing Tao, Ting Han, Ruidong Li. network, 35(4):66-72, 2021. [doi]
- A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G NetworksHaoyu Chen, Bin Yuan, Deqing Zou, Hai Jin 0001. network, 36(4):150-158, 2022. [doi]
- Adversarial Attacks for Intrusion Detection Based on Bus TrafficDaojing He, Jiayu Dai, Xiaoxia Liu, Shanshan Zhu, Sammy Chan, Mohsen Guizani. network, 36(4):203-209, 2022. [doi]
- Deep-Learning-Based Weak Electromagnetic Intrusion Detection Method for Zero Touch Networks on Industrial IoTTingting Wang, Jianqing Li, Wei Wei, Wei Wang 0077, Kai Fang. network, 36(6):236-242, 2022. [doi]
- A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detectionJiankun Hu, Xinghuo Yu, D. Qiu, Hsiao-Hwa Chen. network, 23(1):42-47, 2009. [doi]
- Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare SystemsDaojing He, Qi Qiao, Yun Gao, Jiajia Zheng, Sammy Chan, Jinxiang Li, Nadra Guizani. network, 33(6):64-69, 2019. [doi]