咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 7 篇 计算机科学与技术...
    • 2 篇 机械工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 11 篇 intrusion detect...
  • 2 篇 network security
  • 2 篇 artificial intel...
  • 2 篇 campus network
  • 1 篇 internet of thin...
  • 1 篇 microwave array ...
  • 1 篇 artificial intel...
  • 1 篇 support vector m...
  • 1 篇 svm
  • 1 篇 behavior trust
  • 1 篇 network safety
  • 1 篇 anomaly detectio...
  • 1 篇 algorithms
  • 1 篇 heat loss
  • 1 篇 fwa
  • 1 篇 hackers
  • 1 篇 robust svm
  • 1 篇 optimization
  • 1 篇 machine learning...
  • 1 篇 firewal

机构

  • 1 篇 shaoxing univ sc...
  • 1 篇 zibo vocat inst ...
  • 1 篇 maulana azad nat...
  • 1 篇 nanjing forestry...
  • 1 篇 dartmouth coll t...
  • 1 篇 yunnan arts univ...
  • 1 篇 china civilaviat...
  • 1 篇 north china regi...
  • 1 篇 second res inst ...
  • 1 篇 chongqing three ...
  • 1 篇 inovance technol...
  • 1 篇 shaoxing univ sc...
  • 1 篇 anyang inst tech...
  • 1 篇 inner mongolia a...
  • 1 篇 luoyang inst sci...
  • 1 篇 xi an jiao tong ...
  • 1 篇 nanjing forestry...
  • 1 篇 univ rochester d...
  • 1 篇 school of inform...
  • 1 篇 chongqing three ...

作者

  • 1 篇 li xuelun
  • 1 篇 liu jianhua
  • 1 篇 burroughs d
  • 1 篇 sun zeyu
  • 1 篇 li rui
  • 1 篇 li qiang
  • 1 篇 shao lisong
  • 1 篇 mao wenjing
  • 1 篇 yu sun
  • 1 篇 zhang yaohui
  • 1 篇 wang tiancheng
  • 1 篇 yang zong-chang
  • 1 篇 huo da
  • 1 篇 tian jiahao
  • 1 篇 faizan mohammad
  • 1 篇 gao jian
  • 1 篇 wu xiangwen
  • 1 篇 zhu kaidi
  • 1 篇 pei xikai
  • 1 篇 fu weihong anyan...

语言

  • 9 篇 英文
  • 2 篇 其他
检索条件"主题词=Intrusion Detection Technology"
11 条 记 录,以下是1-10 订阅
排序:
Application of intrusion detection technology in network safety based on machine learning
收藏 引用
SAFETY SCIENCE 2020年 第0期124卷 104604-000页
作者: Fang, Weijian Tan, Xiaoling Wilbur, Dominic Chongqing Three Gorges Univ Coll Comp Sci & Engn Chongqing Peoples R China Chongqing Three Gorges Univ Coll Elect & Informat Engn Chongqing Peoples R China Univ Rochester Dept Comp Sci Rochester NY 14627 USA
As an important means to ensure network safety, intrusion detection technology can be much more efficient by introducing machine learning. The present paper proposes a machine learning method for intrusion information... 详细信息
来源: 评论
Design of intelligent manufacturing monitoring system for internet of things based on encryption technology and intrusion detection technology
收藏 引用
THERMAL SCIENCE AND ENGINEERING PROGRESS 2024年 54卷
作者: Tian, Jiahao Mao, Wenjing Shao, Lisong Wang, Tiancheng Faizan, Mohammad Chen, Yutang Gao, Jian Shaoxing Univ Sch Mech & Elect Engn Shaoxing 312000 Peoples R China Shaoxing Univ Sch Marxism Shaoxing 312000 Peoples R China Nanjing Forestry Univ Res Inst Chinese Ecol Progress & Forestry Dev Nanjing 210037 Peoples R China Maulana Azad Natl Urdu Univ Sch Sci Bot Sect Hyderabad 500032 India Nanjing Forestry Univ Nanjing 210037 Peoples R China Inovance Technol Co Ltd Shenzhen 518110 Peoples R China
With the rapid development of intelligent manufacturing, energy consumption and safety issues have gradually attracted widespread attention. Heat loss not only leads to energy waste, but also may affect the efficiency... 详细信息
来源: 评论
Research on intrusion detection technology Based on Nodes Optimization Deployment in Wireless Sensor Networks
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第8期10卷 159-172页
作者: Sun, Zeyu Li, Longxing Li, Xuelun Luoyang Inst Sci Technol Sch Comp & Informat Engn Luoyang 471023 Henan Peoples R China Xi An Jiao Tong Univ Sch Elect & Informat Engn Xian 710049 Shanxi Peoples R China Tianjing Univ Sch Elect Informat Engn Tianjin 300072 Peoples R China
Security issues of wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other security mechanisms, intrusion detection technology has become... 详细信息
来源: 评论
Research on intrusion detection technology Based on Artificial Intelligence Algorithms
Research on Intrusion Detection Technology Based on Artifici...
收藏 引用
作者: Jing Huayang Yunnan Arts University Wenhua College
With the rapid development of information technology and computers, the number of attacks on the network is increasing, and a single firewall can no longer meet the needs of Internet users. The application of intrusio... 详细信息
来源: 评论
FWA-SVM Network intrusion Identification technology for Network Security
收藏 引用
IEEE ACCESS 2025年 13卷 18579-18593页
作者: Zhang, Yaohui Hunan Post & Telecommun Coll Informat & Commun Dept Changsha 410000 Hunan Peoples R China
In the digital age, the increasing demand for network security has driven research on efficient network intrusion detection systems. The effectiveness of traditional network intrusion is limited in the face of complex... 详细信息
来源: 评论
Application and optimization of intrusion detection system based on Artificial Intelligence  2
Application and optimization of intrusion detection system b...
收藏 引用
2nd IEEE International Conference on Civil Aviation Safety and Information technology (ICCASIT)
作者: Zhu, Kaidi Wu, Xiangwen Yu, Sun Huo, Da Li, Rui Pei, Xikai Second Res Inst CAAC Chengdu Peoples R China Inner Mongolia Autonomous Reg Civil Airports Grp Hulun Buir Branch Hulunbeir Peoples R China North China Regionnal Air Traff Management Bur CA Beijing Peoples R China China Civilaviat Adm Air Traff Management Bur Beijing Peoples R China
The traditional perimeter intrusion detection system will be faced more challenges in the new era, such as high-accuracy positioning, low energy dependence, high environmental robustness and so on. This paper introduc... 详细信息
来源: 评论
Introduction to state-of-the-art intrusion detection technologies
Introduction to state-of-the-art intrusion detection technol...
收藏 引用
Conference on Enabling Technologies for Law Enforcement and Security
作者: Bilar, D Burroughs, D Dartmouth Coll Thayer Sch Engn Hanover NH 03755 USA
A safe communication infrastructure is critical to maintaining the prosperity and pre-eminence of the United States in the 21(st) century. intrusion detection systems (IDS) help identify and respond to malicious activ... 详细信息
来源: 评论
Artificial intelligence detection system based on multi-sensor and wireless communication
收藏 引用
INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS 2024年 第3期18卷 2577-2588页
作者: Li, Qiang Zibo Vocat Inst Sch Artificial Intelligence & Big Data Zibo Shandong Peoples R China
In today's world, Internet technology and wireless communication technology are becoming more and more mature, which has brought massive network information resources to all sectors of society. At the same time, t... 详细信息
来源: 评论
Study on Campus Network Security and Protection technology
Study on Campus Network Security and Protection Technology
收藏 引用
2nd International Conference on Advanced Design and Manufacturing Engineering (ADME 2012)
作者: Fu, Weihong Liu, Jianhua Anyang Inst Technol Anyang 455000 Peoples R China
While the popularization of campus network plays an inestimable role in accelerating the information processing, making full use of excellent education resources, improving work efficiency and implementing the resourc... 详细信息
来源: 评论
Design and Implementation of an “Intruding detection System” for Web Server
Design and Implementation of an “Intruding Detection System...
收藏 引用
2012 International Conference on Management Sciences and Information technology(MSIT 2012)
作者: Yang Zong-chang School of Information and Electronical Engineering Hunan University of Science and Technology
Situation of Internet security in China is facing serious challenges though it has made a rapid development in information field. intrusion detection technology is a developing network security technology. However, ma... 详细信息
来源: 评论