Cited By
View all- Brosolo MPuthuvath VKA ARehiman RConti M(2024)SoK: Visualization-based Malware Detection TechniquesProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664514(1-13)Online publication date: 30-Jul-2024
- Li JShi HZhang W(2024)BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC54092.2024.10831010(1109-1115)Online publication date: 6-Oct-2024
- Agrafiotis GKalafatidis SGiapantzis KLalas AVotis K(2024)Advancing Cybersecurity with AI: A Multimodal Fusion Approach for Intrusion Detection Systems2024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)10.1109/MeditCom61057.2024.10621237(51-56)Online publication date: 8-Jul-2024
- Show More Cited By