[1] |
ZHANG Hao, ZHANG Xiaoyu, ZHANG Zhenyou, LI Wei.
Summary of Intrusion Detection Models Based on Deep Learning
[J]. Computer Engineering and Applications, 2022, 58(6): 17-28.
|
[2] |
ZHANG Ran, PAN Zhihan, YIN Yifeng, CAI Zengyu.
Network Security Situation Assessment Model Based on SAA-SSA-BPNN
[J]. Computer Engineering and Applications, 2022, 58(11): 117-124.
|
[3] |
HUANG Yilei, XIA Zhijie, WANG Yiming.
Research on False Information Dissemination Model of Strong-Ties Social Media
[J]. Computer Engineering and Applications, 2021, 57(9): 126-133.
|
[4] |
PENG Chunyan, DU Xiujuan.
Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(2): 76-81.
|
[5] |
GOU Jijun, LI Junhua, CHEN Chen, CHEN Yiming, LV Yida.
Network Intrusion Detection Method Based on Random Forest
[J]. Computer Engineering and Applications, 2020, 56(2): 82-88.
|
[6] |
ZHOU Long, WANG Chen, SHI Yin.
Research of Webshell Detection Based on RNN
[J]. Computer Engineering and Applications, 2020, 56(14): 88-92.
|
[7] |
WU Depeng, LIU Yi.
Intrusion Detection Model Based on Self-Organizing Map of Variable Network Structure
[J]. Computer Engineering and Applications, 2020, 56(12): 81-86.
|
[8] |
SHI Leyi, LIU Jia, LIU Yihao, ZHU Hongqiang, DUAN Pengfei.
Survey of Research on Network Security Situation Awareness
[J]. Computer Engineering and Applications, 2019, 55(24): 1-9.
|
[9] |
ZHANG Shujuan1, ZHANG Juan2.
Dynamical Modeling and Analysis of Passive Worms Propagation in P2P Networks
[J]. Computer Engineering and Applications, 2019, 55(11): 60-66.
|
[10] |
MA Zhanfei1, YANG Jin2, JIN Yi2, BIAN Qi3.
Network Intrusion Detection Method Based on IQPSO-IDE Algorithm
[J]. Computer Engineering and Applications, 2019, 55(10): 115-120.
|
[11] |
YAN Yan1,2, WANG Wanjun3.
Privacy risk situation assessment method based on partial connection numbers
[J]. Computer Engineering and Applications, 2018, 54(10): 143-148.
|
[12] |
LIU Shiwen, SI Cheng, ZHANG Hongqi.
Fine-grained network threat situation assessment method
[J]. Computer Engineering and Applications, 2018, 54(10): 149-153.
|
[13] |
LIU Zuanshi, GENG Xiuli.
Trusted cloud service evaluation method research based on D-S theory
[J]. Computer Engineering and Applications, 2017, 53(17): 70-76.
|
[14] |
FENG Bo1, GUO Fan2, TAN Suwen3.
Attack source traceback scheme based on probabilistic packet marking for IPv6 network
[J]. Computer Engineering and Applications, 2016, 52(6): 102-106.
|
[15] |
ZHANG Yiyu, YANG Qing.
Research on mobile Internet security situation assessment based on Fuzzy Analytic Hierarchy Process
[J]. Computer Engineering and Applications, 2016, 52(24): 107-111.
|