[1] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(07): 1229-1236.
|
[2] |
TAN Yu-song, WANG Wei, JIAN Song-lei, YI Chao-xiong.
Weakly-supervised IDS with abnormal-preserving transformation learning
[J]. Computer Engineering & Science, 2024, 46(05): 801-809.
|
[3] |
.
Double-Bagging based feature dimension reduction heterogenous integrated intrusion detection
[J]. Computer Engineering & Science, 2023, 45(06): 1011-1019.
|
[4] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[5] |
LIU Yun, ZHENG Wen-feng, ZHANG Yi.
Optimization of intrusion detection feature extraction by cost constraint algorithm
[J]. Computer Engineering & Science, 2022, 44(03): 447-453.
|
[6] |
CUI Ying.
Event extraction in political diplomacy based on similar semantics and dependency syntax
[J]. Computer Engineering & Science, 2020, 42(09): 1632-1639.
|
[7] |
ZHU Shi-song,BA Meng-long,WANG Hui,SHEN Zi-hao.
An intrusion detection technology based on NBSR model
[J]. Computer Engineering & Science, 2020, 42(03): 427-433.
|
[8] |
WU You-xi,WANG Bo,GAO Xue-dong.
An online pattern matchingsolving algorithm
under the nonoverlapping condition
[J]. Computer Engineering & Science, 2019, 41(12): 2239-2246.
|
[9] |
DING Hongwei,WAN Liang,DENG Xuankun.
Optimizing intrusion detection of BP neural networks
by a modified harmony search algorithm
[J]. Computer Engineering & Science, 2019, 41(01): 65-72.
|
[10] |
YU Weisheng1,DENG Wei1,ZHANG Yao2,LI Shuyu1,2.
Music popular trends prediction based on time series
[J]. Computer Engineering & Science, 2018, 40(09): 1703-1709.
|
[11] |
WANG Linlin1,LIU Jinghao1,FU Xiaomei2.
An intrusion detection method based on
extreme learning machine and modified K-means
[J]. Computer Engineering & Science, 2018, 40(08): 1398-1404.
|
[12] |
LIU Shiwen1,5,MA Duoyao2,4,LEI Cheng1,3,5,YIN Shaodong2,4,ZHANG Hongqi1,5.
An active defense technique based
on network security awareness
[J]. Computer Engineering & Science, 2018, 40(06): 1057-1061.
|
[13] |
ZHANG Feng-bin,FAN Xue-lin,XI Liang.
A multi-objective optimization based clonal
selection algorithm in immune invasion detection
[J]. Computer Engineering & Science, 2018, 40(02): 261-267.
|
[14] |
LIU Qiang,CAI Zhi-ping,YIN Jian-ping,DONG De-zun,TANG Yong,ZHANG Yi-ming.
Frameworks and methods of cybersecurity detection
[J]. Computer Engineering & Science, 2017, 39(12): 2224-2229.
|
[15] |
JIANG Wen-chao1,LIN De-xi1,SUN Ao-bing2,WU Xiao-qiang2.
A novel big data order-preserving matching
algorithm based on similarity filtration
[J]. Computer Engineering & Science, 2017, 39(07): 1249-1256.
|