Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220400151-6.doi: 10.11896/jsjkx.220400151
• Information Security • Previous Articles Next Articles
REN Gaoke1, MO Xiuliang2
CLC Number:
[1]GONG J,ZHANG X,SHU Q,et al,Survey of network security situation awareness[J].Journal of Software,2017,28(4):1010-1026. [2]DONG G,LI W,WANG S,et al.The assessment method of network security situation based on improved BP neural network[C]//International Conference on Computer Engineering and Networks.Cham:Springer,2018:67-76. [3]HE Y.Assessment model of network security situation based on K nearest neighbor and support vector machine[J].Computer Engineering and Applications,2013,49(9):81-84. [4]ZHAO D M,SONG H Q,ZHANG H B.Network security situation based on time factor and composite CNN structure[J].Computer Science,2021,48(12):349-356. [5]TAVALLAEE M,BAGHERI E,LU W,et al.A de-tailed analysis of the KDD CUP 99 data set[C]//2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.IEEE,2009:1-6. [6]MELL P,SCARFONE K,ROMANOSKYS.Common vulnerability scoring system[J].IEEE Security & Privacy,2006,4(6):85-89. [7]State Council.National master plan for resp-onding to public emergencies[M].Beijing:China Legal Publishing House,2006:4-6. [8]KE G,MENG Q,FINLEY T,et al.Lightgbm:Ahighly efficient gradient boosting decision tree[J].Advances in Neural Information Processing Systems,2017,30:6-8 [9]ZHOU J Y,HE P F,QIU R F,et al.Research on intrusion detection based on random Forest and gradient[J].Journal of Software,2021,32(10):3254-3265. [10]SCHONLAU M,ZOU R Y.The random forest algorithm for statistical learning[J].The Stata Journal,2020,20(1):3-29. [11]NAGHIBI S A,HASHEMI H,BERNDTSSONR,et al.Application of extreme gradient boosting and parallel random forest algorithms for assessing groundwater spring potential using DEM-derived factors[J].Journal of Hydrology,2020,589:125197. [12]SHANG Q,FENG L,GAO S.A hybrid method for traffic incident detection using random forest-recursive feature elimination and long short-term memory network with bayesian optimization algorithm[J].IEEE Access,2020,9:1219-1232. [13]KILIÇ H,YÜZGEÇ U.Tournament selection based antlion optimization algorithm for solving quadratic assignment problem[J].Engineering Science and Technology,an International Journal,2019,22(2):673-691. [14]WANG J H,DAN Z L,et al.NetWork securety situation assessment based on genetic optimized PNN neural netword[J].Computer Science,2021,48(06):338-342. [15]OPITZ J,BURST S.Macro f1 and macro f1[J].arXiv:1911.03347,2019. [16]SHAH K,PATEL H,SANGHVI D,et al.A comparative analysis of logistic regression,random forest and KNN models for the text classification[J].Augmented Human Research,2020,5(1):1-16. [17]TAO P,SUN Z,SUN Z.An improved intrusion detection algorithm based on GA and SVM[J].IEEE Access,2018,6:13624-13631. [18]SHI Q,KANG J,WANG R,et al.A framework of intrusion detection system based on Bayesian network in IoT[J].International Journal of Performability Engineering,2018,14(10):2280-2293. [19]DONG G,LI W,WANG S,et al.The assessment method of network security situation based on improved BP neural network[C]//International Conference on Computer Engineering and Networks.Cham:Springer,2018:67-76. |
[1] | LIU Ziwen, YU Lijuan, SU Yixing, ZHAO Yao, SHI Zhu. Test Case Generation Based on Web Application Front-end Behavior Model [J]. Computer Science, 2023, 50(7): 18-26. |
[2] | LI Kun, GUO Wei, ZHANG Fan, DU Jiayu, YANG Meiyue. Adversarial Malware Generation Method Based on Genetic Algorithm [J]. Computer Science, 2023, 50(7): 325-331. |
[3] | ZHANG Zelun, YANG Zhibin, LI Xiaojie, ZHOU Yong, LI Wei. Machine Learning Based Environment Assumption Automatic Generation for Compositional Verification of SCADE Models [J]. Computer Science, 2023, 50(6): 297-306. |
[4] | CHANG Liwei, LIU Xiujuan, QIAN Yuhua, GENG Haijun, LAI Yuping. Multi-source Fusion Network Security Situation Awareness Model Based on Convolutional Neural Network [J]. Computer Science, 2023, 50(5): 382-389. |
[5] | ZHONG Jialin, WU Yahui, DENG Su, ZHOU Haohao, MA Wubin. Multi-objective Federated Learning Evolutionary Algorithm Based on Improved NSGA-III [J]. Computer Science, 2023, 50(4): 333-342. |
[6] | SHANG Yuye, YUAN Jiabin. Task Offloading Method Based on Cloud-Edge-End Cooperation in Deep Space Environment [J]. Computer Science, 2023, 50(2): 80-88. |
[7] | GAO Zhen-zhuo, WANG Zhi-hai, LIU Hai-yang. Random Shapelet Forest Algorithm Embedded with Canonical Time Series Features [J]. Computer Science, 2022, 49(7): 40-49. |
[8] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[9] | YANG Hao-xiong, GAO Jing, SHAO En-lu. Vehicle Routing Problem with Time Window of Takeaway Food ConsideringOne-order-multi-product Order Delivery [J]. Computer Science, 2022, 49(6A): 191-198. |
[10] | WANG Wen-qiang, JIA Xing-xing, LI Peng. Adaptive Ensemble Ordering Algorithm [J]. Computer Science, 2022, 49(6A): 242-246. |
[11] | QUE Hua-kun, FENG Xiao-feng, LIU Pan-long, GUO Wen-chong, LI Jian, ZENG Wei-liang, FAN Jing-min. Application of Grassberger Entropy Random Forest to Power-stealing Behavior Detection [J]. Computer Science, 2022, 49(6A): 790-794. |
[12] | ZHANG Xiao-qing, FANG Jian-sheng, XIAO Zun-jie, CHEN Bang, Risa HIGASHITA, CHEN Wan, YUAN Jin, LIU Jiang. Classification Algorithm of Nuclear Cataract Based on Anterior Segment Coherence Tomography Image [J]. Computer Science, 2022, 49(3): 204-210. |
[13] | SHEN Biao, SHEN Li-wei, LI Yi. Dynamic Task Scheduling Method for Space Crowdsourcing [J]. Computer Science, 2022, 49(2): 231-240. |
[14] | WANG Ze-qing, JI Sheng-peng, LI Xin, ZHAO Zi-xuan, WANG Peng-xu, HAN Xiao-song. Novel College Entrance Filling Recommendation Algorithm Based on Score Line Prediction andMulti-feature Fusion [J]. Computer Science, 2022, 49(11A): 211100266-7. |
[15] | ZHANG Bing-qing, FEI Qi, WANG Yi-chen, Yang Zhao. Study on Integration Test Order Generation Algorithm for SOA [J]. Computer Science, 2022, 49(11): 24-29. |
|