Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 335-337.
• Information Security • Previous Articles Next Articles
CHEN Wei-peng1,2, AO Zhi-gang1, GUO Jie1, YU Qin1, TONG Jun1
CLC Number:
[1]罗守山.入侵检测[M].北京:北京邮电大学出版社,2004:82-87. [2]于德江.灰色系统建模方法的探讨[J].系统工程,1991,9(5):9-12. [3]谢丽霞,王亚超,于巾博.基于神经网络的网络安全态势感知[J].清华大学学报,2013,53(12):1750-1760. [4]梁颖,王慧强,赖积保.一种基于粗糙集理论的网络安全态势感知方法[J].计算机科学,2007,34(8):95-97. [5]张云涛,龚玲.数据挖掘原理与技术[M].北京:电子工业出版社,2004:1-57. [6]孙德衡.基于指标融合的网络安全态势评估模型研究[D].西安:西北大学,2012. [7]郑皆亮.基于灰色理论的网络信息安全评估模型研究[D].南京:南京信息工程大学,2005. [8]飞思科技.神经网络理论和matlab7实现[M].北京:电子工业出版社,2006:15-30. [9]林蔚天.改进的粒子群优化算法研究及其若干应用[D].上海:华东理工大学,2012. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[3] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[4] | LIU Bao-bao, YANG Jing-jing, TAO Lu, WANG He-ying. Study on Prediction of Educational Statistical Data Based on DE-LSTM Model [J]. Computer Science, 2022, 49(6A): 261-266. |
[5] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[6] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[7] | XU Jia-nan, ZHANG Tian-rui, ZHAO Wei-bo, JIA Ze-xuan. Study on Improved BP Wavelet Neural Network for Supply Chain Risk Assessment [J]. Computer Science, 2022, 49(6A): 654-660. |
[8] | XIA Jing, MA Zhong, DAI Xin-fa, HU Zhe-kun. Efficiency Model of Intelligent Cloud Based on BP Neural Network [J]. Computer Science, 2022, 49(2): 353-367. |
[9] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[10] | CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497. |
[11] | TANG Liang, LI Fei. Research on Forecasting Model of Internet of Vehicles Security Situation Based on Decision Tree [J]. Computer Science, 2021, 48(6A): 514-517. |
[12] | CHENG Tie-jun, WANG Man. Network Public Opinion Trend Prediction of Emergencies Based on Variable Weight Combination [J]. Computer Science, 2021, 48(6A): 190-195. |
[13] | GUO Fu-min, ZHANG Hua, HU Rong-hua, SONG Yan. Study on Method for Estimating Wrist Muscle Force Based on Surface EMG Signals [J]. Computer Science, 2021, 48(6A): 317-320. |
[14] | WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342. |
[15] | ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300. |
|