咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 软件工程

主题

  • 7 篇 intrusion detect...
  • 2 篇 abnormal receive...
  • 2 篇 wireless sensor ...
  • 2 篇 algorithm simula...
  • 1 篇 cloud data
  • 1 篇 semi-supervised ...
  • 1 篇 autocoder
  • 1 篇 rbf neural netwo...
  • 1 篇 elm
  • 1 篇 protection syste...
  • 1 篇 wireless sensor ...
  • 1 篇 generative adver...
  • 1 篇 consumer privacy...
  • 1 篇 business experie...
  • 1 篇 campus network s...
  • 1 篇 quantitative com...
  • 1 篇 electronic comme...
  • 1 篇 immersive
  • 1 篇 multiple granula...
  • 1 篇 deep forest

机构

  • 1 篇 yichun univ sch ...
  • 1 篇 hunan univ sci &...
  • 1 篇 nanjing univ pos...
  • 1 篇 jimei univ coll ...
  • 1 篇 zhanjiang univ s...
  • 1 篇 huazhong univ sc...

作者

  • 1 篇 wang shaorong
  • 1 篇 meng zhonglou
  • 1 篇 li zeyi
  • 1 篇 wang pan
  • 1 篇 long guiling
  • 1 篇 yang yahong
  • 1 篇 hu lehua
  • 1 篇 wang shu
  • 1 篇 zhuang sumei
  • 1 篇 zhuang jiandong
  • 1 篇 wang qi
  • 1 篇 liu xiaobing
  • 1 篇 huang tangsen
  • 1 篇 qiwang shuwang z...
  • 1 篇 yang jie
  • 1 篇 luo entao
  • 1 篇 yin xiangdong
  • 1 篇 wang zixuan
  • 1 篇 zeng yongjin

语言

  • 7 篇 英文
检索条件"主题词=intrusion detection algorithm"
7 条 记 录,以下是1-10 订阅
排序:
Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
收藏 引用
SOFT COMPUTING 2023年 第10期27卷 6835-6844页
作者: Wang Shaorong Long Guiling Yichun Univ Sch Math & Comp Sci Yichun 336000 Jiangxi Peoples R China
The continuous progress of society has created conditions for the widespread use of information technology. People rely more and more on information technology and the Internet. People can use the Internet to retrieve... 详细信息
来源: 评论
Applying an intrusion detection algorithm to Wireless Sensor Networks
Applying an Intrusion Detection Algorithm to Wireless Sensor...
收藏 引用
2nd International Workshop on Knowledge Discovery Data Mining
作者: Wang, Qi Wang, Shu Meng, Zhonglou Huazhong Univ Sci & Technol Elect & Informat Engn Dept Wuhan 430074 Peoples R China
Although static sensor nodes have low computation and communication capabilities, they have specific properties, and can acquire stable neighboring nodes' information, which can be used for detection of anomalies ... 详细信息
来源: 评论
Applying an intrusion detection algorithm to Wireless Sensor Networks
Applying an Intrusion Detection Algorithm to Wireless Sensor...
收藏 引用
2009 Second International Workshop on Knowledge Discovery and Data Mining
作者: QiWang,ShuWang,ZhonglouMeng Department of Electronics and Information Engineering Huazhong University of Science and Technology Wuhan,China
Although static sensor nodes have low computation and communication capabilities,they have specific properties,and can acquire stable neighboring nodes' information,which can be used for detection of anomalies in ... 详细信息
来源: 评论
A Survey of Quantitative Comparative Research on intrusion detection algorithms in Wireless Sensor Networks  20
A Survey of Quantitative Comparative Research on Intrusion D...
收藏 引用
IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
作者: Yang, Yahong Wang, Pan Wang, ZiXuan Li, Zeyi Nanjing Univ Posts & Telecommun Sch Modern Posts Nanjing Jiangsu Peoples R China
Wireless Sensor Network (WSN) is vulnerable to malicious attacks by third parties due to limited communication capabilities and unstable channels. Moreover, WSN nodes have limited energy, small storage space, and poor... 详细信息
来源: 评论
E-commerce consumer privacy protection and immersive business experience simulation based on intrusion detection algorithms
收藏 引用
ENTERTAINMENT COMPUTING 2024年 51卷
作者: Zhuang, Sumei Zhanjiang Univ Sci & Technol Sch Management Zhanjiang 524000 Guangdong Peoples R China
In the process of e -commerce shopping, immersive service experiences and entertainment shopping models are increasingly popular among consumers. This article analyzes the privacy protection and immersive business exp... 详细信息
来源: 评论
Semi-Supervised intrusion detection Method based on Adversarial Autocoder  19
Semi-Supervised Intrusion Detection Method based on Adversar...
收藏 引用
6th IEEE Cyber Science and Technology Congress (CyberSciTech)
作者: Liu, Xiaobing Luo, Entao Yang, Jie Yin, Xiangdong Huang, Tangsen Hu, Lehua Hunan Univ Sci & Engn Sch Informat Engn Yongzhou Peoples R China
In terms of the problems of low-grade accuracy and high-grade inaccurate alarm rate for intrusion detection algorithm on the basis of unsupervised learning, and high cost of training samples required by supervised alg... 详细信息
来源: 评论
Construction Cosine Radial Basic Function Neural Networks Based on Artificial Immune Networks
Construction Cosine Radial Basic Function Neural Networks Ba...
收藏 引用
6th International Conference on Advanced Data Mining and Applications (ADMA)
作者: Zeng, YongJin Zhuang, JianDong Jimei Univ Coll Comp Sci & Technol Xiamen 361021 Peoples R China
In this paper, we propose a novel intrusion detection algorithm utilizing both Artificial Immune Network and RBF neural network. The proposed anomaly detection method using multiple granularities artificial immune net... 详细信息
来源: 评论