Cited By
View all- Wang C(2024)Theoretical Exploration of Extension Analysis of Network Behavior Information Detection2024 5th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)10.1109/AINIT61980.2024.10581747(2133-2137)Online publication date: 29-Mar-2024
- Eke CNorman AMulenga M(2023)Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping reviewArtificial Intelligence Review10.1007/s10462-022-10382-356:8(8815-8858)Online publication date: 17-Jan-2023
- Sun Y(2022)Research on Network Access Control System Model Based on Virtualization Technology2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)10.1109/ICERECT56837.2022.10059594(1-5)Online publication date: 26-Dec-2022
- Show More Cited By