Computer Science ›› 2018, Vol. 45 ›› Issue (8): 141-145.doi: 10.11896/j.issn.1002-137X.2018.08.025
• Information Security • Previous Articles Next Articles
NAN Shi-hui1, WEI Wei2, WU Hua-qing1, ZOU Jing-rong2, ZHAO Zhi-wen1,2
CLC Number:
[1]LI F,DURUMERIC Z,CZYZ J,et al.You’ve got vulnerability:Exploring effective vulnerability notifycations[C]∥Proceedings of the 25th USENIX Security Symposium.2016:1033-1050. [2]MAKINO Y,KLYUEV V.Evaluation of Web vulnerability scan-ners[C]∥IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems:Technology and Applications.IEEE,2015:399-402. [3]PARVEZ M,ZAVARSKY P,KHOURY N.Analysis of effectiveness of black-box web application scanners in detection of stored SQL injection and stored XSS vulnerabilities[C]∥IEEE International Conference for Internet Technology and Secured Transactions.2015:186-191. [4]KISS B,KOSMATOV N,PARIENTE D,et al.Combining Static and Dynamic Analyses for Vulnerability Detection:Illustration on Heart bleed[M]∥Hardware and Software:Verification and Testing.2015. [5]KHADEMI A F,ZULKERNINE M,WELDEMARIAM K.An Empirical Evaluation of Web-Based Fingerprinting[J].Software IEEE,2015,32(4):46-52. [6]LEE D,ROWE J,KO C,et al.Detecting and Defending against Web-Server Fingerprinting[C]∥2002 Proceedings Computer Security Applications Conference.IEEE,2002:321-330. [7]WU S H,SUN D,HU Y.Web Server Identification Based onBayesian Theory[J].Computer Engineering,2015,41(7):190-193,198.(in Chinese).吴少华,孙丹,胡勇.基于贝叶斯理论的Web服务器识别.计算机工程,2015,41(7):190-193,198. [8]HUANG Z,XIA C,SUN B,et al.Analyzing and summarizingthe web server detection technology based on HTTP[C]∥2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS).IEEE,2015:1042-1045. [9]YAN S J,WANG W J,ZHANG Y Q.An efficient method of Web fingerprint identification. Journal of University of Chinese Academy of Sciences,2016,33(5):679-685.(in Chinese)闫淑筠,王文杰,张玉清.一种有效的Web指纹识别方法[J].中国科学院大学学报,2016,33(5):679-685. [10]CAO L C,ZHAO J J,CUI X,et al.Cyberspace device identification based on K-means with cosine distance measure.Journal of University of Chinese Academy of Sciences,2016,33(4):562-569.(in Chinese)曹来成,赵建军,崔翔,等.基于余弦测度下K-means的网络空间终端设备识别[J].中国科学院大学学报,2016,33(4):562-569. [11]MAHDAVI A.Applying an Ensemble Learning Method for Improving Multi-label Classificati on Performance[C]∥2016 2nd International Conference of Signal Processing and Intelligent System(ICSPIS).2016. [12]LIAO Z,HUANG Y,YUE X,et al.In Silico Prediction of Gamma-Aminobutyric Acid Type-A Receptors Using Novel Machine-Learning-Based SVM and GBDT Approaches [J].Biomed Research International,2016,2016(6):1-12. [13]LIU Q,LIU C.A novel locally linear KNN model for visual reco-gnition[C]∥IEEE Conference on Computer Vision and Pattern Recognition.IEEE,2015:1329-1337. |
[1] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[2] | LIN Xi, CHEN Zi-zhuo, WANG Zhong-qing. Aspect-level Sentiment Classification Based on Imbalanced Data and Ensemble Learning [J]. Computer Science, 2022, 49(6A): 144-149. |
[3] | KANG Yan, WU Zhi-wei, KOU Yong-qi, ZHANG Lan, XIE Si-yu, LI Hao. Deep Integrated Learning Software Requirement Classification Fusing Bert and Graph Convolution [J]. Computer Science, 2022, 49(6A): 150-158. |
[4] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[5] | WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133. |
[6] | HAN Hong-qi, RAN Ya-xin, ZHANG Yun-liang, GUI Jie, GAO Xiong, YI Meng-lin. Study on Cross-media Information Retrieval Based on Common Subspace Classification Learning [J]. Computer Science, 2022, 49(5): 33-42. |
[7] | REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271. |
[8] | CHEN Wei, LI Hang, LI Wei-hua. Ensemble Learning Method for Nucleosome Localization Prediction [J]. Computer Science, 2022, 49(2): 285-291. |
[9] | LIU Zhen-yu, SONG Xiao-ying. Multivariate Regression Forest for Categorical Attribute Data [J]. Computer Science, 2022, 49(1): 108-114. |
[10] | ZHOU Xin-min, HU Yi-gui, LIU Wen-jie, SUN Rong-jun. Research on Urban Function Recognition Based on Multi-modal and Multi-level Data Fusion Method [J]. Computer Science, 2021, 48(9): 50-58. |
[11] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[12] | ZHOU Gang, GUO Fu-liang. Research on Ensemble Learning Method Based on Feature Selection for High-dimensional Data [J]. Computer Science, 2021, 48(6A): 250-254. |
[13] | DAI Zong-ming, HU Kai, XIE Jie, GUO Ya. Ensemble Learning Algorithm Based on Intuitionistic Fuzzy Sets [J]. Computer Science, 2021, 48(6A): 270-274. |
[14] | CHEN Ming-hao, ZHU Yue-fei, LU Bin, ZHAI Yi, LI Ding. Classification of Application Type of Encrypted Traffic Based on Attention-CNN [J]. Computer Science, 2021, 48(4): 325-332. |
[15] | HUAN Wen-ming, LIN Hai-tao. Design of Intrusion Detection System Based on Sampling Ensemble Algorithm [J]. Computer Science, 2021, 48(11A): 705-712. |
|