咨询与建议

限定检索结果

文献类型

  • 15 篇 期刊文献
  • 10 篇 会议

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23 篇 工学
    • 9 篇 电气工程
    • 7 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 信息与通信工程
    • 2 篇 测绘科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 矿业工程
    • 1 篇 环境科学与工程(可...
  • 5 篇 理学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 25 篇 cusum algorithm
  • 2 篇 anomaly detectio...
  • 2 篇 denial of servic...
  • 2 篇 network security
  • 2 篇 wsn
  • 2 篇 fault detection
  • 2 篇 address half int...
  • 2 篇 roof bolter
  • 1 篇 drilling paramet...
  • 1 篇 geotechnical eng...
  • 1 篇 probability dens...
  • 1 篇 fuzzy logic
  • 1 篇 rotation pressur...
  • 1 篇 intrusion detect...
  • 1 篇 accurate emergen...
  • 1 篇 fault prediction
  • 1 篇 energy control
  • 1 篇 quantum informat...
  • 1 篇 mutual coherence
  • 1 篇 leak detection

机构

  • 1 篇 univ british col...
  • 1 篇 hunan univ sch c...
  • 1 篇 univ michigan de...
  • 1 篇 guangdong polyte...
  • 1 篇 univ n carolina ...
  • 1 篇 center of excell...
  • 1 篇 school of comput...
  • 1 篇 korea aerosp uni...
  • 1 篇 univ illinois de...
  • 1 篇 tomsk polytech u...
  • 1 篇 guangzhou univ s...
  • 1 篇 univ maryland sy...
  • 1 篇 univ bourgogne f...
  • 1 篇 rensselaer polyt...
  • 1 篇 qualcomm inc cor...
  • 1 篇 experian costa m...
  • 1 篇 indian inst tech...
  • 1 篇 lebanese univ la...
  • 1 篇 colorado sch min...
  • 1 篇 electro-mechanic...

作者

  • 2 篇 liu wenpeng
  • 2 篇 el sibai rayane
  • 2 篇 demerjian jacque...
  • 1 篇 shumway rh
  • 1 篇 de aquino fernan...
  • 1 篇 tao tao
  • 1 篇 kannu arun pacha...
  • 1 篇 jorge rafael men...
  • 1 篇 sarvepalli prade...
  • 1 篇 jieren cheng
  • 1 篇 s. jamali
  • 1 篇 chen alex
  • 1 篇 cha jihyoung
  • 1 篇 saab samer s. jr...
  • 1 篇 georges bastin
  • 1 篇 da costa katheri...
  • 1 篇 s. m. shahrtash
  • 1 篇 jain aditi
  • 1 篇 krishnaprasad ps
  • 1 篇 erik weyer

语言

  • 23 篇 英文
  • 2 篇 其他
检索条件"主题词=CUSUM algorithm"
25 条 记 录,以下是21-30 订阅
排序:
Leak detection in open water channels
收藏 引用
IFAC Proceedings Volumes 2008年 第2期41卷 7913-7918页
作者: Erik Weyer Georges Bastin Department of Electrical and Electronic Engineering The University of Melbourne Parkville VIC 3010 Australia Center for Systems Engineering and Applied Mechanics (CESAME) University of Louvain-La-Neuve Batiment Euler 4 Avenue G. Lemaitre B-1348 Louvain-la Neuve Belgium
In this paper we present a simple cumulative sum algorithm for detection of leaks in open water channels. The algorithm compares the observed changes in water levels against the known in- and out-flows and raises an a... 详细信息
来源: 评论
Detecting DDoS Attack Using Flow Half Interaction Sequence Change-point Detection Method
Detecting DDoS Attack Using Flow Half Interaction Sequence C...
收藏 引用
2010 Third International Conference on Education Technology and Training (ETT 2010)
作者: Jieren Cheng 1,2,3, Xiangyan Tang4, Jianping Yin2, Xiyuan Chen1 1 (Hangzhou Dianzi University, 310018, Chenzhou, China) 2 (School of Computer, National University of Defense Technology, 410073 Changsha, China) 3 (Department of Mathematics, Xiangnan University, 423000 Chenzhou, China) 4(Hunan Institute of Standardization, Changsha 410007, China)
Distributed denial-of-service (DDoS) attacks present serious threats to servers in the Internet. Detection of DDoS attacks is a challenging task requiring novel approaches. We present IP flow address half interaction ... 详细信息
来源: 评论
Detecting DDOS Attack Using Flow Half Interaction Sequence Changepoint Detection Method
Detecting DDOS Attack Using Flow Half Interaction Sequence C...
收藏 引用
2012 2nd International Conference on Advanced Materials and Information Technology Processing(AMITP 2012)
作者: Jieren Cheng Xiangyan Tang Jianping Yin Xiyuan Chen Hangzhou Dianzi University School of Computer National University of Defense Technology Department of Mathematics Xiangnan University Hunan Institute of Standardization
Distributed denial-of-service(DDoS) attacks present serious threats to servers in the *** of DDoS attacks is a challenging task requiring novel *** present IP flow address half interaction value(AHIV) algorithm is pro... 详细信息
来源: 评论
Security Assessment for a Cumulative Sum-Based Fault Detector in Transmission Lines
Security Assessment for a Cumulative Sum-Based Fault Detecto...
收藏 引用
International Conference on Environment and Electrical Engineering
作者: M. R. Noori S. Jamali S. M. Shahrtash Center of Excellence for Power System Automation and Operation Iran University of Science and Technology (IUST)
Fault detectors have a main role in protection algorithms and should have reliable performance in both dependability and security approaches. In this paper, the robustness of a cumulative sum-based (cusum) fault detec... 详细信息
来源: 评论
A Real-Time DDoS Attack Detection and Prevention System Based on per-IP Traffic Behavioral Analysis
A Real-Time DDoS Attack Detection and Prevention System Base...
收藏 引用
2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010
作者: Yi Zhang College of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing china Qiang Liu College of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing china Guofeng Zhao College of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing china
While many offline-based detection approaches have been well studied, the on-line detection of DDoS attack at leaf router near victims still poses quite a challenge to network administrators. Based on per-IP traffic b... 详细信息
来源: 评论