Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230700051-5.doi: 10.11896/jsjkx.230700051
• Information Security • Previous Articles Next Articles
CHEN Xiangxiao, CUI Xin, DU Qin, TANG Haoyao
CLC Number:
[1]China Internet Network Information Center Releases the 51stStatistical Report on the Development Status of the Internet in China[J].National Library Journal,2023,32(2):39. [2]ZHANG Y,CUI L,WANG W,et al.A survey on software defined networking with multiple controllers[J].Journal of Network and Computer Applications,2018,103:101-118. [3]LU J,ZHANG Z,HU T,et al.A Survey of Controller Place-ment Problem in Software in Software-Defined Networking[J].IEEE Access,2019,7:24290-24307. [4]LI H T,WANG R M,DONG W Y,et al.A GRU-based method for semi-supervised network traffic anomaly detection[J].Computer Science,2023,50(3):380-390. [5]LI X,ZHANG X,ZHANG P,et al.Fault data detection of traffic detector based on wavelet packet in the residual subspace associated with PCA[J].Applied Sciences,2019,9(17):3491. [6]WANG Y G,SHU Z Y,TIAN X.Incremental Kernel principle components subspace inference with mystrom approximation for Bayesian deep learning[J].IEEE Access,2021(9):36241-36251. [7]ZHANG Z F,WANG L M.Research on network intrusion detection algorithms based on machine learning[J].Computer Applications and Software,2022,39(10):336-343. [8]AL-FAWA’REH M,AL-FAYOUMI M,NASHWAN S,et al.Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior[J].Egyptian Informatics Journal,2022,23(2):173-185. [9]MOHAMMADI M,RASHID T A,KARIM S H T,et al.Acomprehensive survey and taxonomy of the SVM-based intrusion detection systems[J].Journal of Network and Computer Applications,2021,178:102983. [10]KHOEI T T,AISSOU G,HU W C,et al.Ensemble learningmethods for anomaly intrusion detection system in smart grid[C]//2021 IEEE International Conference on Electro Information Technology(EIT).IEEE,2021:129-135. [11]ISLAM F B,NWAKANMA C I,LEE J M,et al.Enhancing Malicious Activity Classification of IoT Network Traffic Characteristics using Stacked Ensemble Learning[C]//2021 26th IEEE International Conference on Emerging Technologies and Factory Automation(ETFA).IEEE,2021:1-4. [12]LI Q Y,XINGH J.KPCA Anomaly Detection Method Based on Maximum Correlation Entropy[J].Computer Science,2022,49(8):267-272. [13]PENG Y,FENG S,JIA S,et al.Research on satellite anomaly detection method based on PCA-DNMFSC[J].Computer Simulation,2023,40(1):48-52,142. [14]ZHUANG H,WENG Z,HE R,et al.GKEAL:Gaussian Kernel Embedded Analytic Learning for Few-Shot Class Incremental Task[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2023:7746-7755. [15]ZHAO Y,YI P,ZHANG Z,et al.Anomaly detection method for SDN network edge switch[J].Computer Science,2023,50(1):362-372. [16]HONG S S,LEE E,KIM H.An Advanced Fitness Function Optimization Algorithm for Anomaly Intrusion Detection Using Feature Selection[J].Applied Sciences,2023,13(8):4958-4985. [17]ALMAIAH M A,ALMOMANI O,ALSAAIDAH A,et al.Performance Investigation of Principal Component Analysis for Intrusion Detection System Using Different Support Vector Machine Kernels[J].Electronics,2022,11(21):3571-3586. [18]SINGH C E,VIGILA S M C.Fuzzy based intrusion detectionsystem in MANET[J].Measurement:Sensors,2023,26:100578. [19]RAJAGOPAL S,KUNDAPUR P P,HAREESHA K S.A stacking ensemble for network intrusion detection using heterogeneous datasets[J].Security and Communication Networks,2020,2020:1-9. [20]DO XUAN C,THANH H,LAMN T.Optimization of network traffic anomaly detection using machine learning[J].International Journal of Electrical & Computer Engineering(2088-8708),2021,11(3):2360-2370. |
[1] | ZHOU Tianyang, YANG Lei. Study on Client Selection Strategy and Dataset Partition in Federated Learning Basedon Edge TB [J]. Computer Science, 2024, 51(6A): 230800046-6. |
[2] | SI Jia, LIANG Jianfeng, XIE Shuo, DENG Yingjun. Research Progress of Anomaly Detection in IaaS Cloud Operation Driven by Deep Learning [J]. Computer Science, 2024, 51(6A): 230400016-8. |
[3] | WANG Zhaodan, ZOU Weiqin, LIU Wenjie. Buggy File Identification Based on Recommendation Lists [J]. Computer Science, 2024, 51(6A): 230600088-8. |
[4] | LIU Wei, SONG You, ZHUO Peiyan, WU Weiqiang, LIAN Xin. Study on Kcore-GCN Anti-fraud Algorithm Fusing Multi-source Graph Features [J]. Computer Science, 2024, 51(6A): 230600040-7. |
[5] | TIAN Shuaihua, LI Zheng, WU Yonghao, LIU Yong. Identifying Coincidental Correct Test Cases Based on Machine Learning [J]. Computer Science, 2024, 51(6): 68-77. |
[6] | LIN Binwei, YU Zhiyong, HUANG Fangwan, GUO Xianwei. Data Completion and Prediction of Street Parking Spaces Based on Transformer [J]. Computer Science, 2024, 51(4): 165-173. |
[7] | WANG Degang, SUN Yi, GAO Qi. Active Membership Inference Attack Method Based on Multiple Redundant Neurons [J]. Computer Science, 2024, 51(4): 373-380. |
[8] | WANG Xin, HUANG Weikou, SUN Lingyun. Survey of Incentive Mechanism for Cross-silo Federated Learning [J]. Computer Science, 2024, 51(3): 20-29. |
[9] | ZHANG Wenqiong, LI Yun. Fairness Metrics of Machine Learning:Review of Status,Challenges and Future Directions [J]. Computer Science, 2024, 51(1): 266-272. |
[10] | FU Jianming, JIANG Yuqian, HE Jia, ZHENG Rui, SURI Guga, PENG Guojun. Cryptocurrency Mining Malware Detection Method Based on Sample Embedding [J]. Computer Science, 2024, 51(1): 327-334. |
[11] | LI Meng, DAI Haipeng, SUI Yongxi, GU Rong, CHEN Guihai. Survey of Learning-based Filters [J]. Computer Science, 2024, 51(1): 41-49. |
[12] | LI Ke, YANG Ling, ZHAO Yanbo, CHEN Yonglong, LUO Shouxi. EGCN-CeDML:A Distributed Machine Learning Framework for Vehicle Driving Behavior Prediction [J]. Computer Science, 2023, 50(9): 318-330. |
[13] | HUANG Shuxin, ZHANG Quanxin, WANG Yajie, ZHANG Yaoyuan, LI Yuanzhang. Research Progress of Backdoor Attacks in Deep Neural Networks [J]. Computer Science, 2023, 50(9): 52-61. |
[14] | WANG Yao, LI Yi. Termination Analysis of Single Path Loop Programs Based on Iterative Trajectory Division [J]. Computer Science, 2023, 50(9): 108-116. |
[15] | LIU Xiang, ZHU Jing, ZHONG Guoqiang, GU Yongjian, CUI Liyuan. Quantum Prototype Clustering [J]. Computer Science, 2023, 50(8): 27-36. |
|