咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 5 篇 计算机科学与技术...
    • 3 篇 材料科学与工程(可...
    • 3 篇 信息与通信工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 测绘科学与技术
    • 1 篇 软件工程
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 12 篇 ac algorithm
  • 3 篇 intrusion detect...
  • 2 篇 protocol frame c...
  • 2 篇 bm algorithm
  • 2 篇 apriori algorith...
  • 2 篇 protocol reverse...
  • 1 篇 steganography to...
  • 1 篇 frames
  • 1 篇 binary data
  • 1 篇 stego image dete...
  • 1 篇 frame
  • 1 篇 cost early warni...
  • 1 篇 pattern matching
  • 1 篇 user satisfactio...
  • 1 篇 textile industry
  • 1 篇 identifiable fea...
  • 1 篇 rjmcmc algorithm
  • 1 篇 kmeans algorithm
  • 1 篇 ga algorithm
  • 1 篇 iterative effici...

机构

  • 1 篇 univ elect sci &...
  • 1 篇 career acad elec...
  • 1 篇 tianjin key labo...
  • 1 篇 sci & technol in...
  • 1 篇 univ elect sci &...
  • 1 篇 zhengzhou sci & ...
  • 1 篇 chuzhou polytech...
  • 1 篇 fuzhou college o...
  • 1 篇 shanghai univ po...
  • 1 篇 china telecom re...
  • 1 篇 college of compu...
  • 1 篇 state key lab ma...
  • 1 篇 guizhou univ gui...
  • 1 篇 institute of com...
  • 1 篇 langfang teacher...

作者

  • 1 篇 she xiaoming
  • 1 篇 jia mo
  • 1 篇 zhu jianchi
  • 1 篇 zheng jie
  • 1 篇 yuan liu
  • 1 篇 liu fenlin
  • 1 篇 xiaolu meng
  • 1 篇 yu wu
  • 1 篇 fanzhi meng
  • 1 篇 chunrui zhang
  • 1 篇 luo xiangyang
  • 1 篇 pan xiaohui
  • 1 篇 peng xie
  • 1 篇 h.t.chen
  • 1 篇 kefei cheng
  • 1 篇 wang jianxiu
  • 1 篇 f.y.wang
  • 1 篇 zhao dongming
  • 1 篇 li qiyao
  • 1 篇 chen mel

语言

  • 12 篇 英文
检索条件"主题词=AC algorithm"
12 条 记 录,以下是1-10 订阅
排序:
Research on the performance analysis of network intrusion detection of ac algorithm
Research on the performance analysis of network intrusion de...
收藏 引用
3rd International Conference on Material Science, Environment Science and Computer Science (MSESCS 2014)
作者: Zhao Dongming Langfang Teachers Coll Langfang Hebei Peoples R China
As the use of computers become more widely, its intrusion security has become a key issue. In order to solve this problem, this article proposes a analysis research on ac algorithm for the detection of network intrusi... 详细信息
来源: 评论
Research on cost early warning of textile industry based on ac algorithm
Research on cost early warning of textile industry based on ...
收藏 引用
2016 3rd International Conference on Modern Economic Technology and Management(ICMETM 2016)
作者: Xiaolu Meng Fuzhou College of Foreign Studies and Trade
In recent years,the textile industry faces huge pressure domestically and *** a small profit margin in the textile industry,it becomes very important to improve the economic efficiency and the cost ***,establishing an... 详细信息
来源: 评论
Intelligent design generation of plane pattern based on RJMCMC algorithm
收藏 引用
JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2025年 第1期25卷 752-765页
作者: Shi, Xiaoyun Chuzhou Polytech Sch Commun & Design Chuzhou Peoples R China
Pattern design has a wide range of applications in daily life, such as decoration design, web design, and so on. Common design methods include artificial design and intelligent design, and design methods based on inte... 详细信息
来源: 评论
An improved ac pattern matching algorithm
An improved AC pattern matching algorithm
收藏 引用
2nd International Conference on Information Technology and Management Innovation (ICITMI 2013)
作者: Jia, Mo Chen, Mel Li, Hui Guizhou Univ Guizhou Engn Lab Adv Comp & Med Informat Serv Guiyang Peoples R China
In this paper, we study how to improve the efficiency of classic ac matching algorithm for scanning systems, and proposed an algorithm named ac-SUN based on Sunday matching algorithm. In our design, ac-SUN combines ju... 详细信息
来源: 评论
Research on a cluster system for binary data frames of wireless sensor network
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2016年 第2期19卷 783-791页
作者: Zheng, Jie Univ Elect Sci & Technol China Dept Comp Sci & Engn Chengdu 611731 Peoples R China Career Acad Elect Engn Chongqing Chongqing 401331 Peoples R China
As the development of network became more complex, protocol reverse engineering has attracted increasing attention and widely applied in intrusion detection, vulnerability discovery, and electronic countermeasures. To... 详细信息
来源: 评论
Rapid Detection of Stego Images Based on Identifiable Features  17
Rapid Detection of Stego Images Based on Identifiable Featur...
收藏 引用
17th IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICacT)
作者: Pang, Weiwei Luo, Xiangyang Ren, Jie Yang, Chunfang Liu, Fenlin State Key Lab Math Engn & Adv Comp Zhengzhou 450001 Peoples R China Zhengzhou Sci & Technol Inst Zhengzhou 450001 Peoples R China Sci & Technol Informat Assurance Lab Beijing 100072 Peoples R China
An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a method of images steganalysis rapidly based on... 详细信息
来源: 评论
Efficient Network Packet Signature Matching on GPUs
Efficient Network Packet Signature Matching on GPUs
收藏 引用
2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA)
作者: Pan, Xiaohui Shanghai Univ Polit Sci & Law Modern Educ Technol Ctr Shanghai 201701 Peoples R China
Network signature matching is an important task in many applications such as network security or traffic analysis, which generally rely on a flexible signature matching system to extract important packet information f... 详细信息
来源: 评论
Intelligent Dynamic Resource Allocation for Network Slicing Based on actor-Critic algorithm  14
Intelligent Dynamic Resource Allocation for Network Slicing ...
收藏 引用
14th IEEE International Conference on Advanced Infocomm Technology (ICAIT)
作者: Yang, Bei Li, Qiyao She, Xiaoming Zhu, Jianchi Wei, Fengsheng Chen, Peng Wang, Jianxiu China Telecom Res Inst Beijing 102209 Peoples R China Univ Elect Sci & Technol China Chengdu 611731 Peoples R China
Network slicing has been widely acknowledged as a promising architectural technology to meet the different service requirements of diversified applications for future mobile networks. Since there are significant dynam... 详细信息
来源: 评论
Research and improvement of multiple pattern matching algorithm in Linux intrusion detection
Research and improvement of multiple pattern matching algori...
收藏 引用
International Conference on Multimedia, Communication and Computing Application(MCCA 2014)
作者: F.Y.Wang H.T.Chen Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
With the development of Internet,the Linux operating system is widely used,and at the same time,the means of network intrusion attack is also constantly *** detection system can find the intrusion behavior through com... 详细信息
来源: 评论
Cluster system for binary data frame
Cluster system for binary data frame
收藏 引用
ICINS 2014 - 2014 International Conference on Information and Network Security
作者: Yang Yue Yuan Liu Chunrui Zhang Fanzhi Meng Institute of Computer Application China Academy of Engineering Physics Mianyang Sichuan 621900 China
Protocol reverse engineering is very important for information security. In the complex wireless network environment, in order to separate binary data frames for subsequent reverse protocol analysis, this paper propos... 详细信息
来源: 评论