Cited By
View all- Zhao Z(2022)Analysis of Museum Cultural Creation from the Perspective of Cultural IndustryScientific Programming10.1155/2022/81385742022Online publication date: 1-Jan-2022
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed to detect stepping-stone since 1995. One of those approaches proposed by A. ...
More and more intruders are used to using stepping-stone to launch the attacks on their interested targets because exploiting stepping-stones can hide them deeply and make them feel safe. Clustering-Partitioning approach was proposed to detect stepping-...
John Wiley and Sons Ltd.
United Kingdom