[1] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(07): 1229-1236.
|
[2] |
TAN Yu-song, WANG Wei, JIAN Song-lei, YI Chao-xiong.
Weakly-supervised IDS with abnormal-preserving transformation learning
[J]. Computer Engineering & Science, 2024, 46(05): 801-809.
|
[3] |
.
Double-Bagging based feature dimension reduction heterogenous integrated intrusion detection
[J]. Computer Engineering & Science, 2023, 45(06): 1011-1019.
|
[4] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[5] |
LIU Yun, ZHENG Wen-feng, ZHANG Yi.
Optimization of intrusion detection feature extraction by cost constraint algorithm
[J]. Computer Engineering & Science, 2022, 44(03): 447-453.
|
[6] |
ZHU Shi-song,BA Meng-long,WANG Hui,SHEN Zi-hao.
An intrusion detection technology based on NBSR model
[J]. Computer Engineering & Science, 2020, 42(03): 427-433.
|
[7] |
DING Hongwei,WAN Liang,DENG Xuankun.
Optimizing intrusion detection of BP neural networks
by a modified harmony search algorithm
[J]. Computer Engineering & Science, 2019, 41(01): 65-72.
|
[8] |
WANG Linlin1,LIU Jinghao1,FU Xiaomei2.
An intrusion detection method based on
extreme learning machine and modified K-means
[J]. Computer Engineering & Science, 2018, 40(08): 1398-1404.
|
[9] |
LIU Shiwen1,5,MA Duoyao2,4,LEI Cheng1,3,5,YIN Shaodong2,4,ZHANG Hongqi1,5.
An active defense technique based
on network security awareness
[J]. Computer Engineering & Science, 2018, 40(06): 1057-1061.
|
[10] |
ZHANG Feng-bin,FAN Xue-lin,XI Liang.
A multi-objective optimization based clonal
selection algorithm in immune invasion detection
[J]. Computer Engineering & Science, 2018, 40(02): 261-267.
|
[11] |
LIU Qiang,CAI Zhi-ping,YIN Jian-ping,DONG De-zun,TANG Yong,ZHANG Yi-ming.
Frameworks and methods of cybersecurity detection
[J]. Computer Engineering & Science, 2017, 39(12): 2224-2229.
|
[12] |
WU Guo,CHEN Lei,SI Zhi-gang,BAI Li-fang.
An index optimization model for
network security situation evaluation
[J]. Computer Engineering & Science, 2017, 39(05): 861-869.
|
[13] |
ZHAO Ning1,XIE Shucui2.
Analysis and application of the high performance data
packet capture technology based on dpdk
[J]. Computer Engineering & Science, 2016, 38(11): 2209-2215.
|
[14] |
WANG Xin,CHEN Shuhui,SU Jinshu.
Design and implementation of a hardware
based large scale Hash flowtable
[J]. Computer Engineering & Science, 2016, 38(10): 1955-1960.
|
[15] |
REN Fang.
An adaptive distributed private key
generator scheme in Ad Hoc networks
[J]. J4, 2015, 37(07): 1272-1279.
|