Computer Science ›› 2022, Vol. 49 ›› Issue (7): 357-362.doi: 10.11896/jsjkx.210900103
• Information Security • Previous Articles
ZHAO Dong-mei1,2, WU Ya-xing1, ZHANG Hong-bin3
CLC Number:
[1]National Internet Emergency Response Center(CNERT/CC).Report on Monitoring Data Analysis of China's Internet Network Security in the first half of 2021 [EB/OL].(2021-07-31)[2021-08-10].http://www.cert.org.cn/publish/main/46/index.html. [2]WEN Z C,CHEN Z G,TANG J.Network security situationprediction based on time series analysis[J].Journal of South China University of Technology(Natural Science Edition),2016,44(5):137-143,150. [3]ZHANG X,HU C Z,LIU S H,et al.Research on network attack Situation Prediction Technology based on Support Vector Machine[J].Computer Engineering,2007(11):10-12. [4]ZHAO D M,SONG H Q,LI H.Fuzzy integrated rough set theory situation feature extraction of network security[J].Journal of Intelligent & Fuzzy Systems,2021,40(4):8439-8450. [5]WANG H B,ZHAO D M,LI X X.Research on Network Secu-rity Situation Assessment And Forecasting Technology[J].Journal of Web Engineering,2020,19(7/8):1239-1266. [6]ZHAO D M,WANG H B.Compound Attack Prediction Method Based on Improved Algorithm of Hidden Markov Model[J].Journal of Web Engineering,2020,19(7/8):1213-1238. [7]ZHAO D M,LIU J X.Study on network security situationawareness based on particle swarm optimization algorithm[J].Computers & Industrial Engineering,2018,125:764-775. [8]SONG H Q,ZHAO D M.Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action Factor[J].Mobile Networks and Applications,2021:26(3):1008-1023. [9]LIU K Z,GOU J P,LUO Z,et al.Prediction method of Dis-solved Gas Concentration in Transformer Oil Based on Particle Swarm Optimization-Long Short-term Memory Network Model[J].Power Grid Technology,2020,44(7):2778-2785. [10]HU Q S,LI C H,LU Y L,et al.Network Security Situation Prediction Method Based on Hierarchically Optimized Belief Rule Base[J].Computer Engineering,2020,46(12):127-133. [11]TANG Y Q,LI C H,SONG Y F.Network Security Situation Prediction Based on Improved Particle Swarm Optimization and Extreme Learning Machine[J].Computer Applications,2021,41(3):768-773. [12]KONG W,DONG Z Y,JIA Y,et al.Short-Term ResidentialLoad Forecasting Based on LSTM Recurrent Neural Network[J].IEEE Transactions on Smart Grid(S1949-3053),2019,1(10):841-851. [13]HOCHREITER S,SCHMIDHUBER J.Long Short-term Me-mory[J].Neural Computation,1997,9:1735-1780. [14]KENNEDY J,EBERHART R.Particle swarm optimization[C]//Proceedings of the 1995 International Conference on Neural Networks.Piscataway:IEEE,1995:1942-1948. [15]ALDAWERI M S,ARIFFIN K Z,ABDULLAH S,et al.AnAnalysis of the KDD99 and UNSW-NB15 Datasets for the Intrusion Detection System[J].Symmetry,2020,12(10):1666-1666. [16]SARIKA C,NISHTHA K.Analysis of KDD-Cup'99,NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT[J].Procedia Computer Science,2020,167:1561-1573. [17]LUO Z.Research on Network Security Situation Assessmentand Prediction Technology based on Neural Network [D].Xi'an:Northwest University,2018. |
[1] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[2] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[3] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[4] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
[5] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[6] | WANG Run-an, ZOU Zhao-nian. Query Performance Prediction Based on Physical Operation-level Models [J]. Computer Science, 2022, 49(8): 49-55. |
[7] | CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85. |
[8] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[9] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[10] | QI Xiu-xiu, WANG Jia-hao, LI Wen-xiong, ZHOU Fan. Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning [J]. Computer Science, 2022, 49(7): 18-24. |
[11] | YANG Bing-xin, GUO Yan-rong, HAO Shi-jie, Hong Ri-chang. Application of Graph Neural Network Based on Data Augmentation and Model Ensemble in Depression Recognition [J]. Computer Science, 2022, 49(7): 57-63. |
[12] | ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105. |
[13] | DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119. |
[14] | LIU Yue-hong, NIU Shao-hua, SHEN Xian-hao. Virtual Reality Video Intraframe Prediction Coding Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(7): 127-131. |
[15] | XU Ming-ke, ZHANG Fan. Head Fusion:A Method to Improve Accuracy and Robustness of Speech Emotion Recognition [J]. Computer Science, 2022, 49(7): 132-141. |
|