[1] |
LIU Pei, LIU Chang-hua, LIN Qiao-ling .
An intrusion detection model for vehicular networks based on optimized feature stacking and ensemb
[J]. Computer Engineering & Science, 2024, 46(12): 2186-2195.
|
[2] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(07): 1229-1236.
|
[3] |
TAN Yu-song, WANG Wei, JIAN Song-lei, YI Chao-xiong.
Weakly-supervised IDS with abnormal-preserving transformation learning
[J]. Computer Engineering & Science, 2024, 46(05): 801-809.
|
[4] |
.
Double-Bagging based feature dimension reduction heterogenous integrated intrusion detection
[J]. Computer Engineering & Science, 2023, 45(06): 1011-1019.
|
[5] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[6] |
LIU Yun, ZHENG Wen-feng, ZHANG Yi.
Optimization of intrusion detection feature extraction by cost constraint algorithm
[J]. Computer Engineering & Science, 2022, 44(03): 447-453.
|
[7] |
ZHU Shi-song,BA Meng-long,WANG Hui,SHEN Zi-hao.
An intrusion detection technology based on NBSR model
[J]. Computer Engineering & Science, 2020, 42(03): 427-433.
|
[8] |
DING Hongwei,WAN Liang,DENG Xuankun.
Optimizing intrusion detection of BP neural networks
by a modified harmony search algorithm
[J]. Computer Engineering & Science, 2019, 41(01): 65-72.
|
[9] |
WANG Linlin1,LIU Jinghao1,FU Xiaomei2.
An intrusion detection method based on
extreme learning machine and modified K-means
[J]. Computer Engineering & Science, 2018, 40(08): 1398-1404.
|
[10] |
LIU Shiwen1,5,MA Duoyao2,4,LEI Cheng1,3,5,YIN Shaodong2,4,ZHANG Hongqi1,5.
An active defense technique based
on network security awareness
[J]. Computer Engineering & Science, 2018, 40(06): 1057-1061.
|
[11] |
ZHANG Feng-bin,FAN Xue-lin,XI Liang.
A multi-objective optimization based clonal
selection algorithm in immune invasion detection
[J]. Computer Engineering & Science, 2018, 40(02): 261-267.
|
[12] |
LIU Qiang,CAI Zhi-ping,YIN Jian-ping,DONG De-zun,TANG Yong,ZHANG Yi-ming.
Frameworks and methods of cybersecurity detection
[J]. Computer Engineering & Science, 2017, 39(12): 2224-2229.
|
[13] |
WU Guo,CHEN Lei,SI Zhi-gang,BAI Li-fang.
An index optimization model for
network security situation evaluation
[J]. Computer Engineering & Science, 2017, 39(05): 861-869.
|
[14] |
ZHAO Ning1,XIE Shucui2.
Analysis and application of the high performance data
packet capture technology based on dpdk
[J]. Computer Engineering & Science, 2016, 38(11): 2209-2215.
|
[15] |
WANG Xin,CHEN Shuhui,SU Jinshu.
Design and implementation of a hardware
based large scale Hash flowtable
[J]. Computer Engineering & Science, 2016, 38(10): 1955-1960.
|