Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 524-528.doi: 10.11896/jsjkx.200500001
• Information Security • Previous Articles Next Articles
ZHAO Zhi-qiang, YI Xiu-shuang, LI Jie, WANG Xing-wei
CLC Number:
[1] SUN S Y.IPv6:Opportunities for the Development of NextGeneration Internet in China [J].The Internet Economy,2018(8):20-25. [2] PRAPTODIYONO S,MURUGESAN R K,HASBULLAH IH,et al.Security mechanism for IPv6 stateless address autoconfiguration[C]// International Conference on Automation,Cognitive Science,Optics,MICRO Electro-Mechanical System,and Information Technology.IEEE,2016:31-36. [3] WANG J S,LI J Y,ZHANG H W,et al.Design of Large-scale Network Anomaly Traffic Detection System Based on IPv6[J].Computer Engineering,2018,44(10):14-21. [4] ARD J B.Internet Protocol version Six (IPv6) at UC Davis:Traffic Analysis with a Security Perspective[J].Dissertations & Theses - Gradworks,2012:20. [5] SAGALA A.Automatic SNORT IDS rule generation based on honeypot log[C]// International Conference on Information Technology and Electrical Engineering.IEEE,2016:576-580. [6] ZULKIFLEE M.A Framework of Features Selection for IPv6 Network Attacks Detection[J].WSEAS Transactions on Communications,2015,14(46):399-408. [7] LI D,LI Y,YUAN C,et al.The application of decision treeC4.5 algorithm to soil quality grade forecasting model[C]// IEEE International Conference on Computer Communication and the Internet.IEEE,2016:552-555. [8] LI B,CHEN A B,ZHOU T,et al.Grade evaluation based on improved C4.5 algorithm in forest fire danger[J].Hunan Forestry Science & Technology,2018,45(1):36-40. [9] DU J L,YAN W L.Multiple classifiers of C4.5 decision tree based on distance weight[J].Computer Engineering and Design,2018,39(1):96-102. [10] XIAO H H,DUAN Y M.Improved the KNN Algorithm Based on Related to the Distance of Attribute Value[J].Computer Science,2013,40(S2):157-159,187. [11] DAI P W,PAN B,WANG Y M,et al.An Improved KNN Algorithm Based on Analytic Hierarchy Process[J].Journal of Liaoning Shihua University,2018,38(4):87-92. [12] PENG Y.Precision marketing system of terminal based on Data mining[D].Nanjing:Nanjing University,2014. [13] ZHANG Y Q.Improvement of Algorithm for finding Segmentation Points of Continuous Value of Decision Tree[J].Computer CD Software and Applications,2013,16(23):116-117. [14] KDD Cup 1999 Data [EB/OL].http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. |
[1] | WANG Dong, WANG Hu and JIANG Qian-li. Low Power Long Distance Marine Environment Monitoring System Based on 6LoWPAN [J]. Computer Science, 2020, 47(6A): 596-598. |
[2] | PANG Li-hui and JIANG Feng. Research on High Performance Rule Matching Algorithm in IPV6 Networks [J]. Computer Science, 2017, 44(3): 158-162. |
[3] | CAO Xu, ZHU Yue-fei and FEI Jin-long. Cooperative Address Knocking Based Covert Authentication [J]. Computer Science, 2016, 43(9): 175-179. |
[4] | ZHANG Jian-ming, ZHAO Li-jie and FENG Xia. Fast Handover Strategy Research Based on Mobile IPv6 in VANET [J]. Computer Science, 2016, 43(10): 93-97. |
[5] | QIN Li, HUANG Shu-guang and CHEN Xiao. Research on Invulnerability of IPv6 AS-level Internet [J]. Computer Science, 2015, 42(8): 161-165. |
[6] | CHEN Yuan, ZHANG Qi-zhi, RAO Liang and ZHAO Gan-sen. Distributed Network Mobility Management over Proxy Mobile IPv6 Network [J]. Computer Science, 2015, 42(2): 76-80. |
[7] | WANG Xuan,WANG Zhen-xing,WANG Yu and ZHANG Lian-cheng. SSI:A Same Source Identification Model for Multiple IPv6/IPv4 Addresses [J]. Computer Science, 2014, 41(8): 139-143. |
[8] | LIU Qiao-shou,ZHANG-Wei,WANG Ru-yan and WU Da-peng. Performance Analysis for Fragmentation and Assembly Algorithm of 6LoWPAN Adaptation Layer [J]. Computer Science, 2014, 41(7): 176-180. |
[9] | LIU Hui-sheng,WANG Zhen-xing,ZHANG Lian-cheng and HOU Yi. Overlay Network Based IPv6Network Architecture Protection Model [J]. Computer Science, 2013, 40(6): 71-75. |
[10] | WANG Jian-feng,CHEN Can-feng,LIU Jia and XI Min-jun. Internet of Things Architecture Based on IPv6and Bluetooth Low Energy [J]. Computer Science, 2013, 40(5): 97-102. |
[11] | TANG Wei,TANG Hong-bo and CHEN Lu. PMIPv6Based Fast Handover Scheme for Network Mobility [J]. Computer Science, 2013, 40(11): 43-47. |
[12] | . Optimization Scenarios of Interactions between MIPv6 and PMIPv6 Based on Fast Handover [J]. Computer Science, 2012, 39(8): 47-. |
[13] | . Provable Secure Route Optimization Scheme for HMIPv6 in Wireless Mesh Network [J]. Computer Science, 2012, 39(3): 62-66. |
[14] | QIU Quan-jie,WU Zhong-fu. Method for Available Bandwidth Measuring and Analysis of IPv6 Network [J]. Computer Science, 2011, 38(4): 84-86. |
[15] | WANG Ya-gang,DU Hui-min,YANG Kang-ping. Two-stage IPv6 Address Lookup Scheme Based on Hash Tables and Tree Bitmaps [J]. Computer Science, 2010, 37(9): 36-39. |
|