[1] |
Liu Lin-lan, Gao Sheng-rong,Shu Jian.Link quality prediction based on random forest[J].Journal on Communications,2019,40(4):202-211.(in Chinese)
|
[2] |
Tian Ju-fei,Su Huai-zhi.Development and application of dam stress predicition model based on random forest algorithm[J].Water Resources and Power,2018,36(5):54-56.(in Chinese)
|
[3] |
Gou Ji-jun,Li Jun-hua,Chen Chen,et al.Network intrusion detection method based on random forest[J].Computer Engineering and Applications,2020,56(2):82-88.(in Chinese)
|
[4] |
Xiao Qi,Su Kai-yu.Botnet traffic detection based on random forest algorithm[J].Microelectronics & Computer,2019,36(3):43-47.(in Chinese)
|
[5] |
Yu Peng-cheng,Qi Yong,Li Qian-mu.DDoS attack detection method based on random forest[J].Application Research of Computers,2017,34(10):3068-3072.(in Chinese)
|
[6] |
Yuan Jian,Jiang Yu,Sun Yue.Short-term position prediction model for LBSN users based on improved random forest algorithm[J].Journal of Chinese Computer Systems,2019,40(11):2398-2403.(in Chinese)
|
[7] |
Chen Yu,Mao Ying-chi.Automatic tuning of Ceph parameters based on random forest and genetic algorithm[J].Journal of Computer Applications,2020,40(2):347-351.(in Chinese)
|
[8] |
Tao Yang,Pan Lei-na,Wang Jin,et al.A security trust evaluation model for wireless sensor networks defense against trust attacks[J].Chinese Journal of Sensors and Actuators,2018,31(12):1876-1881.(in Chinese)
|
[9] |
Xu Yi-min,Sun Zi-wen.Intrusion detection of jamming attack in industrial wireless sensor networks[J].Chinese Journal of Sensors and Actuators,2017,30(11):1693-1699.(in Chinese)
|
[10] |
Lü Jing-xiang,Luo Wen-lang.Quantization and energy optimization strategy of wireless sensor networks[J].Journal of Electronics & Information Technology,2020,42(5):1118-1124.(in Chinese)
|
[11] |
Wu Ze-hui,Wei Qiang,Wang Qing-xian.Survey for attack and defense approaches of OpenFlow-enabled software defined network[J].Computer Science,2017,44(6):121-132.(in Chinese)
|
[12] |
Zhao Yu,Huang Kai-zhi,Guo Yun-fei,et al.Information diffusion blocking model of node influence-oriented in online social network[J].Journal of Tsinghua University(Science and Technology),2017,57(12):1245-1253.(in Chinese)
|
[13] |
Li Wen-ting,Wang Ding,Wang Ping.Insider attacks against multi-factor authentication protocols for wireless sensor networks[J].Journal of Software,2019,30(8):2375-2391.(in Chinese)
|
[14] |
Wu Yi-chen,Zhang Shu-guang.Defence mechanism against wormhole attacks based on grid[J].Journal of University of Science and Technology of China,2019,49(1):1-7.(in Chinese)
|
[15] |
Wang Jun,Zhu Zhi-wei,Liu Jun-jie.Detection and defense method for blackhole attacks in wireless sensor networks[J].Computer Science,2019,46(2):102-108.(in Chinese)
|
[16] |
Xu Zhen,Li Qiu-wei,Yang Lei.Key management scheme of wireless sensor networks in mobile scene[J].Journal of Henan University of Science and Technology(Natural Science),2020,41(3):35-40.(in Chinese)
|
|
附中文参考文献:
|
[1] |
刘琳岚,高声荣,舒坚.基于随机森林的链路质量预测[J].通信学报,2019,40(4):202-211.
|
[2] |
田菊飞,苏怀智.基于随机森林算法的大坝应力预测模型的构建及其应用[J].水电能源科学,2018,36(5):54-56.
|
[3] |
芶继军,李均华,陈晨,等.基于随机森林的网络入侵检测方法[J].计算机工程与应用,2020,56(2):82-88.
|
[4] |
肖琦,苏开宇.基于随机森林的僵尸网络流量检测[J].微电子学与计算机,2019,36(3):43-47.
|
[5] |
于鹏程,戚湧,李千目.基于随机森林分类模型的DDoS攻击检测方法[J].计算机应用研究,2017,34(10):3068-3072.
|
[6] |
袁健,蒋宇,孙悦.基于改进随机森林算法的LBSN用户短期位置预测模型[J].小型微型计算机系统,2019,40(11):2398-2403.
|
[7] |
陈禹,毛莺池.基于随机森林和遗传算法的Ceph参数自动调优[J].计算机应用,2020,40(2):347-351.
|
[8] |
陶洋,潘蕾娜,王进,等.防御信任攻击的无线传感器网络安全信任评估模型[J].传感技术学报,2018,31(12):1876-1881.
|
[9] |
徐宜敏,孙子文.工业无线传感器网络中干扰攻击的入侵检测[J].传感技术学报,2017,30(11):1693-1699.
|
[10] |
吕敬祥,罗文浪.无线传感网络量化及能量优化策略[J].电子与信息学报,2020,42(5):1118-1124.
|
[11] |
武泽慧,魏强,王清贤.基于OpenFlow的SDN网络攻防方法综述[J].计算机科学,2017,44(6):121-132.
|
[12] |
赵宇,黄开枝,郭云飞,等.在线社会网络中面向节点影响力的信息传播阻断模型[J].清华大学学报(自然科学版),2017,57(12):1245-1253.
|
[13] |
李文婷,汪定,王平.无线传感器网络下多因素身份认证协议的内部人员攻击[J].软件学报,2019,30(8):2375-2391.
|
[14] |
吴一尘,章曙光.基于网格的无线传感器网络虫洞攻击抵御策略[J].中国科学技术大学学报,2019,49(1):1-7.
|
[15] |
王珺,朱志伟,刘俊杰.一种针对无线传感网中黑洞攻击的检测与防御方法[J].计算机科学,2019,46(2):102-108.
|
[16] |
徐震, 李秋苇, 杨蕾. 无线传感器网络中移动场景下的密钥管理方案[J].河南科技大学学报(自然科学版),2020,41(3):35-40.
|