[1] |
Honglei YAO, Jiqiang LIU, Endong TONG, Wenjia NIU.
Network security risk assessment method for CTCS based on α-cut triangular fuzzy number and attack tree
[J]. Journal of Computer Applications, 2024, 44(4): 1018-1026.
|
[2] |
Wanqing XU, Baodong WANG, Yimei HUANG, Jinping LI.
Smoking behavior detection algorithm based on human skeleton key points
[J]. Journal of Computer Applications, 2021, 41(12): 3602-3607.
|
[3] |
LI Ziqiang, WANG Zhengyong, CHEN Honggang, LI Linyi, HE Xiaohai.
Video abnormal behavior detection based on dual prediction model of appearance and motion features
[J]. Journal of Computer Applications, 2021, 41(10): 2997-3003.
|
[4] |
YANG Hongyu, LI Bochao.
Network abnormal behavior detection model based on adversarially learned inference
[J]. Journal of Computer Applications, 2019, 39(7): 1967-1972.
|
[5] |
XU Bingfeng, ZHONG Zhicheng, HE Gaofeng.
Risk analysis of cyber-physical system based on dynamic fault trees
[J]. Journal of Computer Applications, 2019, 39(6): 1735-1741.
|
[6] |
DONG Haiyan, YU Feng, CHENG Ke, HUANG Shucheng.
Credibility analysis method of online user behavior based on non-interference theory
[J]. Journal of Computer Applications, 2019, 39(10): 3002-3006.
|
[7] |
HU Xuemin, YI Chonghui, CHEN Qin, CHEN Xi, CHEN Long.
Abnormal crowd behavior detection based on motion saliency map
[J]. Journal of Computer Applications, 2018, 38(4): 1164-1169.
|
[8] |
TAN Ren, YIN Xiaochuan, LIAN Zhe, CHEN Yuxin.
Hierarchical representation model of APT attack
[J]. Journal of Computer Applications, 2017, 37(9): 2551-2556.
|
[9] |
HE Chuanyang, WANG Ping, ZHANG Xiaohua, SONG Danni.
Abnormal behavior detection of small and medium crowd based on intelligent video surveillance
[J]. Journal of Computer Applications, 2016, 36(6): 1724-1729.
|
[10] |
SUN Runkang, PENG Guojun, LI Jingwen, SHEN Shiqi.
Behavior oriented method of Android malware detection and its effectiveness
[J]. Journal of Computer Applications, 2016, 36(4): 973-978.
|
[11] |
WU Lei, TIAN Ruya, ZHANG Xuefu.
Instance transfer learning model based on sparse hierarchical probabilistic self-organizing graphs
[J]. Journal of Computer Applications, 2016, 36(3): 692-696.
|
[12] |
XU Hao, CHEN Xue, HU Xiaofeng.
Finding method of users' real-time demands for literature search systems
[J]. Journal of Computer Applications, 2015, 35(7): 1975-1978.
|
[13] |
YU Hongyan, CEN Kailun, YANG Tengxiao.
Design and implementation of abnormal behavior detection system in cloud computing
[J]. Journal of Computer Applications, 2015, 35(5): 1284-1289.
|
[14] |
ZHANG Jian-fei CHEN Li-fei GUO Gong-de.
Hierarchical feature selection method for detection of obfuscated malicious code
[J]. Journal of Computer Applications, 2012, 32(10): 2761-2767.
|
[15] |
HAO Zheng-hong CHEN Xing-shu WANG Hai-zhou HU Xin.
Active measurement of PPStream VOD system and client behavior analysis
[J]. Journal of Computer Applications, 2011, 31(11): 3068-3071.
|