Computer Science ›› 2019, Vol. 46 ›› Issue (8): 178-182.doi: 10.11896/j.issn.1002-137X.2019.08.029
• Information Security • Previous Articles Next Articles
DU Zhen, MA Li-peng, SUN Guo-zi
CLC Number:
[1]WANG L,QIAN H L.Computer forensics technology and its development trend[J].Journal of Software,2003,14(9):1635-1644.(in Chinese) 王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. [2]HOU H H.Application research of data mining in computer dy- namic forensics technology[J].Digital Technology and Application,2017,14(8):76-77.(in Chinese) 侯欢欢.数据挖掘在计算机动态取证技术中的应用研究[J].数字技术与应用,2017,14(8):76-77. [3]HU D H,XIA D R,SHI X L,et al.Network forensics technology research[J].Computer Science,2015,23(b10):1-22.(in Chinese) 胡东辉,夏东冉,史昕岭,等.网络取证技术研究[J].计算机科学,2015,23(b10):1-22. [4]LAMABA H,GLAZIER T J,SCHMERL B,et al.A model-based approach to anomaly detection in software architectures[C]∥Symposium and Bootcamp on the Science of Security,2016:69-71. [5]ATEFI K,YAHYA S,REZAEI A,et al.Anomaly detection based on profifie signature in network using machine lear-ning technique∥Region 10 Symposium.2016:71-76. [6]LEITNER M,RINDERLEB M S.Anomaly detection and visua- lization in generative rbac models[C]∥ACM Symposium on Access Control MODELS and Technologies.2014:41-52. [7]ZHOU Y J.Network traffic anomaly detection based on data mining in time-series graph[J].Computer Science,2009,36(1):46-50. [8]BARFORD P,KLINE J,PLONKA D.A signal analysis of network traffic anomalies[C]∥Proc.ACM SIGCOMM Internet Measurement Workshop.Marseille,France,2002:71-82. [9]LUAN K.Robust detection method for network attacks based on wavelet scale decomposition [J].Electronic Technology and Software Engineering,2016,8(4):9.(in Chinese) 栾凯.基于小波尺度分解的网络攻击稳健检测方法[J].电子技术与软件工程,2016,8(4):9. [10]MA X H,Cao J P,DONG S F.Wavelet analysis and application.Microcomputer Development,2003,56(1/2):231-262. [11]Al-QAMMAZ A Y,YUSOF Y,AHAMAD F K.An enhanced discrete wavelet packet transform for feature extraction in electroencephalogram signals[C]∥International Conference.2017:88-93. [12]AHANI S,GHAEMMAGHAMI S Z,WANG Z J.A sparse representation-based wavelet domain speech steganography method[J].IEEE/ACM Transactions on Audio Speech & Language Processing,2015,23(1):80-91. [13]ALI S,HUNG C C.An empirical study on feature extraction for the classification of textural and natural images[C]∥International Conference on Research in Adaptive and Convergent Systems.2016:51-55. [14]ALNASHASH H A,PAUL J S,THAKOR N V.Wavelet entropy method for EEG analysis:application to global brain injury[C]∥International IEEE Embs Conference on Neural Engineering.2016:348-351. [15]MA X H,CAO J P,DONG S F.Wavelet analysis and application[J].Microcomputer Development,2003,56(1/2):231-262. [16]WEI L,GNORBANI A A.Network anomaly detection based onwavelet analysis[J].Eurasip Journal on Advances in Signal Processing,2009,1(2003):1-16. [17]CHEN Z,CHAI K Y,BU S L,et al.A novel anomaly detection system using feature-based MSPCA with sketch[C]∥Wireless and Optical Communication Conference.IEEE,2017:1-6. [18]SALAGEAN M.Real network traffic anomaly detection based on analytical discrete wavelet transform[C]∥International Conference on Optimization of Electrical and Electronic Equipment.2010:926-931. |
[1] | XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110. |
[2] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[3] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[4] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[5] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[6] | DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178. |
[7] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[8] | GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63. |
[9] | SHEN Shao-peng, MA Hong-jiang, ZHANG Zhi-heng, ZHOU Xiang-bing, ZHU Chun-man, WEN Zuo-cheng. Three-way Drift Detection for State Transition Pattern on Multivariate Time Series [J]. Computer Science, 2022, 49(4): 144-151. |
[10] | WU Yu-kun, LI Wei, NI Min-ya, XU Zhi-cheng. Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder [J]. Computer Science, 2022, 49(3): 144-151. |
[11] | ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203. |
[12] | LENG Jia-xu, TAN Ming-pi, HU Bo, GAO Xin-bo. Video Anomaly Detection Based on Implicit View Transformation [J]. Computer Science, 2022, 49(2): 142-148. |
[13] | REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271. |
[14] | ZHANG Ye, LI Zhi-hua, WANG Chang-jie. Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method [J]. Computer Science, 2021, 48(9): 337-344. |
[15] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
|