[1] |
JIANG Kui, QIU Yuandong, ZHENG Haocheng.
ICMPv6 DDoS Attack Detection Method Based on Information Entropy and LSTM
[J]. Computer Engineering and Applications, 2021, 57(21): 148-154.
|
[2] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[3] |
MENG Yuan, TU Shanshan, YU Jinliang.
Detection Scheme of Impersonation Attack Based on DQL Algorithm in Fog Computing
[J]. Computer Engineering and Applications, 2020, 56(10): 63-68.
|
[4] |
CHU Hanting1, XING Xing1,2, MENG Zhixin1, JIA Zhichun1.
Analysis for National Natural Science Foundation of China Funded Projects on Recommender System Research Area
[J]. Computer Engineering and Applications, 2019, 55(9): 259-263.
|
[5] |
LIU Qilie, LI Jianxiong.
Multiple Parameter Detection Algorithm of Cache Pollution Attack in Content Centric Networking
[J]. Computer Engineering and Applications, 2019, 55(4): 130-136.
|
[6] |
JING Hongfei, ZHANG Kun, CAI Bing, YU Longhua.
Detection of Application Layer DDoS Based on BP Neural Network
[J]. Computer Engineering and Applications, 2019, 55(20): 73-79.
|
[7] |
LIU Junjie, WANG Jun, WANG Menglin, WANG Yue.
DDoS Attack Detection Based on C4.5 in SDN
[J]. Computer Engineering and Applications, 2019, 55(20): 84-88.
|
[8] |
HAO Yaojun1,2, ZHANG Fuzhi2.
Ensemble Detection Method for Shilling Attacks Based on Deep Sparse Autoencoder
[J]. Computer Engineering and Applications, 2019, 55(1): 9-22.
|
[9] |
YANG Haopu, WANG Kun.
Phase-based classification and evaluation of APT attack behaviors
[J]. Computer Engineering and Applications, 2017, 53(22): 97-104.
|
[10] |
FENG Bo1, GUO Fan2, TAN Suwen3.
Attack source traceback scheme based on probabilistic packet marking for IPv6 network
[J]. Computer Engineering and Applications, 2016, 52(6): 102-106.
|
[11] |
SUN Jian, LIU Yuan, ZHAO Xinjie.
Detection of application layer DDoS attacks based on clustering
[J]. Computer Engineering and Applications, 2016, 52(21): 116-120.
|
[12] |
HE Heng1,2, HUANG Wei1,2, LI Tao1,2, ZENG Peng1,2, DONG Xinhua3.
Multilevel DDoS protection mechanism based on SDS framework
[J]. Computer Engineering and Applications, 2016, 52(1): 81-88.
|
[13] |
HUANG Lujuan1,3, JIN Guang1,3, HE Jiaming2,3, JIANG Xianliang1.
DDoS defense with jointed deployment of IP traceback and path identification
[J]. Computer Engineering and Applications, 2014, 50(5): 74-78.
|
[14] |
CHEN Shiwen, GUO Tong, HUANG Wanwei.
DDoS attack detection based on fast fractional Fourier transform
[J]. Computer Engineering and Applications, 2013, 49(24): 4-7.
|
[15] |
CHEN Shiwen, WU Jiangxing, HUANG Wanwei.
DDoS attack detection method based on conditional random field with feature set
[J]. Computer Engineering and Applications, 2013, 49(17): 9-11.
|