[1] |
ZHANG Shipeng, LI Yongzhong, DU Xiangtong.
Intrusion detection model based on semi-supervised learning and three-way decision
[J]. Journal of Computer Applications, 2021, 41(9): 2602-2608.
|
[2] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[3] |
WANG Yao, SUN Guozi.
Oversampling method for intrusion detection based on clustering and instance hardness
[J]. Journal of Computer Applications, 2021, 41(6): 1709-1714.
|
[4] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[5] |
REN Xiaokui, LIU Pengfei, TAO Zhiyong, LIU Ying, BAI Lichun.
Indoor intrusion detection based on direction-of-arrival estimation algorithm for single snapshot
[J]. Journal of Computer Applications, 2021, 41(4): 1153-1159.
|
[6] |
QIN Li, HAO Zhigang, LI Guoliang.
Construction and correlation analysis of national food safety standard graph
[J]. Journal of Computer Applications, 2021, 41(4): 1005-1011.
|
[7] |
DAI Tingting, ZHOU Le, YU Qinyong, HUNAG Xifeng, XIE Jun, SONG Minghui, LIU Qiao.
Cyclic iterative ontology construction method based on demand assessment and response
[J]. Journal of Computer Applications, 2020, 40(9): 2712-2718.
|
[8] |
LIU Jingfa, GU Yaoping, LIU Wenjie.
Focused crawler method combining ontology and improved Tabu search for meteorological disaster
[J]. Journal of Computer Applications, 2020, 40(8): 2255-2261.
|
[9] |
MA Dongxue, SONG She, XIE Zhenping, LIU Yuan.
Domain ontology driven approach for bidding webpage parsing
[J]. Journal of Computer Applications, 2020, 40(6): 1574-1579.
|
[10] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|
[11] |
Yi ZHAO, Xing DUAN, Shiyi XIE, Chunlin LIANG.
Traffic image semantic retrieval method based on specific object self-recognition
[J]. Journal of Computer Applications, 2020, 40(2): 553-560.
|
[12] |
OU Binli, ZHONG Xiaru, DAI Jianhua, YANG Tian.
Intrusion detection method based on variable precision covering rough set
[J]. Journal of Computer Applications, 2020, 40(12): 3465-3470.
|
[13] |
LI Zhongwei, TAN Kai, GUAN Yadong, JIANG Wenqi, YE Lin.
In-vehicle CAN bus-off attack and its intrusion detection algorithm
[J]. Journal of Computer Applications, 2020, 40(11): 3224-3228.
|
[14] |
CHI Yaping, MO Chongwei, YANG Yintan, CHEN Chunxia.
Design and implementation of intrusion detection model for software defined network architecture
[J]. Journal of Computer Applications, 2020, 40(1): 116-122.
|
[15] |
YANG Hongyu, WANG Fengyan.
Network intrusion detection model based on improved convolutional neural network
[J]. Journal of Computer Applications, 2019, 39(9): 2604-2610.
|