[1] |
Jiepo FANG, Chongben TAO.
Hybrid internet of vehicles intrusion detection system for zero-day attacks
[J]. Journal of Computer Applications, 2024, 44(9): 2763-2769.
|
[2] |
Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU.
Coverage-guided fuzzing based on adaptive sensitive region mutation
[J]. Journal of Computer Applications, 2024, 44(8): 2528-2535.
|
[3] |
.
Summary of network intrusion detection systems based on deep learning
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[4] |
Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI.
Multi-object cache side-channel attack detection model based on machine learning
[J]. Journal of Computer Applications, 2024, 44(6): 1862-1871.
|
[5] |
.
Location privacy-preserving recommendation scheme based on federated graph neural network
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[6] |
XiangJun LI, Junhong WANG, Shilu WANG, Jinxia CHEN, Jitao SUN, Jianhui WANG.
Malicious traffic detection method based on multi-model parallel fusion network
[J]. Journal of Computer Applications, 2023, 43(S2): 122-129.
|
[7] |
Jingcheng XU, Xuebin CHEN, Yanling DONG, Jia YANG.
DDoS attack detection by random forest fused with feature selection
[J]. Journal of Computer Applications, 2023, 43(11): 3497-3503.
|
[8] |
Shanshan HUO, Yanjun LI, Jian LIU, Yinshuang LI.
Design and implementation of cipher component security criteria testing tool
[J]. Journal of Computer Applications, 2023, 43(10): 3156-3161.
|
[9] |
Xiang GUO, Wengang JIANG, Yuhang WANG.
Encrypted traffic classification method based on improved Inception-ResNet
[J]. Journal of Computer Applications, 2023, 43(8): 2471-2476.
|
[10] |
Kui JIANG, Zhihang YU, Xiaolei CHEN, Yuhao LI.
Design and implementation of Webshell traffic detection system based on BERT-CNN
[J]. Journal of Computer Applications, 2023, 43(S1): 126-132.
|
[11] |
Chao ZHENG, Yueting WU, Ke XIAO.
Intrusion detection based on federated learning and deep residual network
[J]. Journal of Computer Applications, 2023, 43(S1): 133-138.
|
[12] |
Yiting SUN, Yue GUO, Changjin LI, Hongjun ZHANG, Kang LIU, Junjiao Liu, Limin SUN.
Intrusion detection method for control logic injection attack against programmable logic controller
[J]. Journal of Computer Applications, 2023, 43(6): 1861-1869.
|
[13] |
Haiyan HU, Qiaoyan KANG, Shuo ZHAO, Jianfeng WANG, Youbin FU.
Service function chain deployment optimization method based on node comprehensive importance ranking
[J]. Journal of Computer Applications, 2023, 43(3): 860-868.
|
[14] |
Jingyun CHENG, Buhong WANG, Peng LUO.
Static code defect detection method based on deep semantic fusion
[J]. Journal of Computer Applications, 2022, 42(10): 3170-3176.
|
[15] |
Wenting BI, Haitao LIN, Liqun ZHANG.
Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model
[J]. Journal of Computer Applications, 2022, 42(9): 2780-2787.
|