Computer Science ›› 2018, Vol. 45 ›› Issue (7): 154-157.doi: 10.11896/j.issn.1002-137X.2018.07.026
• Information Security • Previous Articles Next Articles
LU Qiang1,YOU Rong-yi1,YE Xiao-hong2
CLC Number:
[1]LI H,QIAN C J,SUN L Z,et al.Simulation of a flexible polymer tethered to a flat adsorbing surface [J].Journal of Applied Polymer Science,2012,124(1):282-287. [2]ZHAO X J,SUN Z X,YUAN Y.An Efficient Association Rule Mining Algorithm Based on Prejudging and Screening[J].Journal of Electronics & Information Technology,2016,38(7):1654-1659.(in Chinese) 赵学健,孙知信,袁源.基于预判筛选的高效关联规则挖掘算法[J].电子与信息学报,2016,38(7):1654-1659. [3]WANG S,ZHAO B F.Network Intrusion Detection Based on Fuzzy Data Mining and Genetic Algorithm[J].Computer Measurement & Control,2012;20(3):660-663.(in Chinese) 王晟,赵壁芳.基于模糊数据挖掘和遗传算法的网络入侵检测技术[J].计算机测量与控制,2012,20(3):660-663. [4]CECI M,MALERBA D.Classifying Web documents in a hierarchy of categories:a comprehensive study[J].Journal of Intelligent Information System,2007,28(1):37-78. [5]ZHANG W M,CHEN Q Z.Network Intrusion Detection Algorithm Based on HHT with Shift Hierarchical Control[J].Computer Science,2014,41(12):107-111.(in Chinese) 章武媚,陈庆章.引入偏移量递阶控制的网络入侵HHT检测算法[J].计算机科学,2014,41(12):107-111. [6]CHEN H,WAN G X,XIAO Z J.Intrusion detection method of deep belief network model based on optimization of data processing[J].Journal of Computer Applications,2017,37(6):1636-1643.(in Chinese) 陈虹,万广雪,肖振久.基于优化数据处理的深度信念网络模型的入侵检测方法[J].计算机应用,2017,37(6):1636-1643. [7]LI F,WU C M.Research on Prevention Fluctuation Control method of Network Intrusion Based on Energy Management[J].Computer Simulation,2013,30(12):45-48.(in Chinese) 黎峰,吴春明.基于能量管理的网络入侵防波动控制方法研究[J].计算机仿真,2013,30(12):45-48. [8]DENG Z H,CAO L B,JIANG Y Z,et al.Minimax probability TSK fuzzy system classifier:A more transparent and highly interpretable classification model[J].IEEE Transactions on Fuzzy Systems,2015,23(4):813-826. [9]HESS R A.Aircraft and rotorcraft system identification-engineering methods with flight test examples[J].Journal of Gui-dance,Control,and Dynamics,2013,36(4):1249-1250. [10]ZHANG H B,HE Q B,KONG F R.Stochastic resonance in an underdamped system with pinning potential for weak signal detection[J].Sensors,2015,15(9):21169-21195. [11]WANG H X,WANG S Y,WANG X,et al.Analysis of LFM signals and improvement of IFM system[J].Acta Armamentarii,2014,35(8):1193-1199.(in Chinese) 王洪迅,王士岩,王星,等.瞬时测频系统的线性调频信号分析及改进[J].兵工学报,2014,35(8):1193-1199. [12]MAHBOUBI H,MOEZZI K,AGHDAM A G,et al.Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors[J].IEEE Transactions on Industrial Informatics,2014,10(1):163-174. [13]MAHBOUBI H.Distributed deployment algorithms for efficient coverage in a network of mobile sensors with nonidentical sen-sing Capabilities[J].IEEE Transactions on Vehicular Technology,2014,63(8):3998-4016. [14]DAI W.Application of Intrusion Detection Technology in Network Security.Journal of Chongqing University of Technology(Natural Science),2018,32(4):156-160,185.(in Chinese) 代威.入侵检测技术在网络安全中的应用.重庆理工大学学报(自然科学),2018,32(4):156-160,185. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | HU Yu-jiao, JIA Qing-min, SUN Qing-shuang, XIE Ren-chao, HUANG Tao. Functional Architecture to Intelligent Computing Power Network [J]. Computer Science, 2022, 49(9): 249-259. |
[3] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[4] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[5] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[6] | ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47. |
[7] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[8] | SONG Jie, LIANG Mei-yu, XUE Zhe, DU Jun-ping, KOU Fei-fei. Scientific Paper Heterogeneous Graph Node Representation Learning Method Based onUnsupervised Clustering Level [J]. Computer Science, 2022, 49(9): 64-69. |
[9] | HUANG Li, ZHU Yan, LI Chun-ping. Author’s Academic Behavior Prediction Based on Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(9): 76-82. |
[10] | ZHENG Wen-ping, LIU Mei-lin, YANG Gui. Community Detection Algorithm Based on Node Stability and Neighbor Similarity [J]. Computer Science, 2022, 49(9): 83-91. |
[11] | LYU Xiao-feng, ZHAO Shu-liang, GAO Heng-da, WU Yong-liang, ZHANG Bao-qi. Short Texts Feautre Enrichment Method Based on Heterogeneous Information Network [J]. Computer Science, 2022, 49(9): 92-100. |
[12] | XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110. |
[13] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
[14] | SHI Dian-xi, ZHAO Chen-ran, ZHANG Yao-wen, YANG Shao-wu, ZHANG Yong-jun. Adaptive Reward Method for End-to-End Cooperation Based on Multi-agent Reinforcement Learning [J]. Computer Science, 2022, 49(8): 247-256. |
[15] | LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266. |
|