[1] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[2] |
ZHANG Bowen, LIU Zhi, SANG Guoming.
Anomaly Detection Algorithm Based on Kernel Density Fluctuation
[J]. Computer Engineering and Applications, 2021, 57(12): 132-136.
|
[3] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[4] |
HE Huanye, LIN Guoyuan, GU Hao, FANG Menghua.
Improved LOF Algorithm in Cloud Virtual Machine Anomaly Detection Scenario
[J]. Computer Engineering and Applications, 2020, 56(23): 80-86.
|
[5] |
ZHAN Peng, CHEN Lin, CAO Luhui, XU Haoran, LI Xueqing.
Time Series Anomaly Detection Based on Kernel Turning Points Clipped Representation
[J]. Computer Engineering and Applications, 2020, 56(23): 130-138.
|
[6] |
LIU Wenfen, MU Xiaodong, HUANG Yuehua.
Anomaly Detection Method Based on Multi-resolution Grid
[J]. Computer Engineering and Applications, 2020, 56(17): 78-85.
|
[7] |
ZHANG Changhua, ZHOU Xiongtu, ZHANG Yong’ai, YAO Jianmin, GUO Tailiang, YAN Qun.
Application Research of Deep Auto Encoder in Data Anomaly Detection
[J]. Computer Engineering and Applications, 2020, 56(17): 93-99.
|
[8] |
XIONG Yi, LIANG Yiwen, TAN Chengyu, ZHOU Wen.
Anomaly Detection Method of Earthquake Precursor Observation Data Based on Negative Selection Algorithm
[J]. Computer Engineering and Applications, 2020, 56(10): 226-230.
|
[9] |
CUI Fangyi1, JING Xiaoyuan2, DONG Xiwei2,3, WU Fei2, SUN Ying2.
Fuzzy Clustering Based on Adaptive Bat Algorithm Optimization and Its Application
[J]. Computer Engineering and Applications, 2019, 55(7): 16-22.
|
[10] |
YANG Feiyue, TAO Yang.
Node Anomaly Detection Algorithm Based on Spatial-Temporal Cooperation in WSNs
[J]. Computer Engineering and Applications, 2019, 55(7): 127-131.
|
[11] |
WANG Kai, CHEN Danwei.
Research on Algorithm of Dynamic Graph Anomaly Detection Based on LSTM
[J]. Computer Engineering and Applications, 2019, 55(5): 76-82.
|
[12] |
HE Liang1, WANG Yongcheng1, LI Yun1, CHU Yanjie1, SHEN Chao2.
Network Anomaly Detection Algorithm Based on Lindeberg-Feller Central Limit Theorem
[J]. Computer Engineering and Applications, 2019, 55(4): 41-47.
|
[13] |
WU Jingfeng, JIN Weidong, TANG Peng.
Catenary Pillar Image Anomaly Detection Combined with SVDD and CNN
[J]. Computer Engineering and Applications, 2019, 55(10): 193-198.
|
[14] |
WU Xiaoquan1,2, LI Hui1,2, CHEN Mei1,2, DAI Zhenyu1,2.
DRVisSys: visualization recommendation system based on attribute correlation analysis
[J]. Computer Engineering and Applications, 2018, 54(7): 251-256.
|
[15] |
HE Lingjun, HU Haibo, PU Yuwen, MA Qi.
Coordinated visualization analysis of anomaly detection for time-varying network
[J]. Computer Engineering and Applications, 2018, 54(21): 71-77.
|