[1] |
ZHANG Shipeng, LI Yongzhong, DU Xiangtong.
Intrusion detection model based on semi-supervised learning and three-way decision
[J]. Journal of Computer Applications, 2021, 41(9): 2602-2608.
|
[2] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[3] |
WANG Yao, SUN Guozi.
Oversampling method for intrusion detection based on clustering and instance hardness
[J]. Journal of Computer Applications, 2021, 41(6): 1709-1714.
|
[4] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[5] |
REN Xiaokui, LIU Pengfei, TAO Zhiyong, LIU Ying, BAI Lichun.
Indoor intrusion detection based on direction-of-arrival estimation algorithm for single snapshot
[J]. Journal of Computer Applications, 2021, 41(4): 1153-1159.
|
[6] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|
[7] |
OU Binli, ZHONG Xiaru, DAI Jianhua, YANG Tian.
Intrusion detection method based on variable precision covering rough set
[J]. Journal of Computer Applications, 2020, 40(12): 3465-3470.
|
[8] |
LI Zhongwei, TAN Kai, GUAN Yadong, JIANG Wenqi, YE Lin.
In-vehicle CAN bus-off attack and its intrusion detection algorithm
[J]. Journal of Computer Applications, 2020, 40(11): 3224-3228.
|
[9] |
CHI Yaping, MO Chongwei, YANG Yintan, CHEN Chunxia.
Design and implementation of intrusion detection model for software defined network architecture
[J]. Journal of Computer Applications, 2020, 40(1): 116-122.
|
[10] |
YANG Hongyu, WANG Fengyan.
Network intrusion detection model based on improved convolutional neural network
[J]. Journal of Computer Applications, 2019, 39(9): 2604-2610.
|
[11] |
CAO Weidong, XU Zhixiang.
Efficient semi-supervised multi-level intrusion detection algorithm
[J]. Journal of Computer Applications, 2019, 39(7): 1979-1984.
|
[12] |
PAN Jianguo, LI Hao.
Intrusion detection approach for IoT based on practical Byzantine fault tolerance
[J]. Journal of Computer Applications, 2019, 39(6): 1742-1746.
|
[13] |
GUO Xudong, LI Xiaomin, JING Ruxue, GAO Yuzhuo.
Intrusion detection based on improved sparse denoising autoencoder
[J]. Journal of Computer Applications, 2019, 39(3): 769-773.
|
[14] |
HU Jian, SU Yongdong, HUANG Wenzai, XIAO Peng, LIU Yuting, YANG Benfu.
Intrusion detection method based on ensemble transfer learning via weighted mutual information
[J]. Journal of Computer Applications, 2019, 39(11): 3310-3315.
|
[15] |
SHEN Xueli, QIN Shujuan.
Anomaly detection based on synthetic minority oversampling technique and deep belief network
[J]. Journal of Computer Applications, 2018, 38(7): 1941-1945.
|