[1] |
LIU Ximei, PAN Lijun.
Clonal Selection Algorithm for Solving Bike Sharing Rebalancing Problem
[J]. Computer Engineering and Applications, 2020, 56(11): 252-258.
|
[2] |
LIU Haiyan, ZHANG Yu, BI Jianquan, XING Meng.
Review of technology based on distributed and collaborative network intrusion detection
[J]. Computer Engineering and Applications, 2018, 54(8): 1-6.
|
[3] |
WANG Qi1,2,3, LU Yuhai1,3, LIU Yang1,3, LIU Yanbing1,3, TAN Jianlong1,3, SUN Bo4.
Dynamical adaptive Karp-Rabin multi-pattern matching algorithm
[J]. Computer Engineering and Applications, 2017, 53(4): 39-44.
|
[4] |
YAO Minghuang, LUO Yanmin.
Improved random forests and its application to classification of remote sensing image
[J]. Computer Engineering and Applications, 2016, 52(4): 168-173.
|
[5] |
SUN Jian, LIU Yuan, ZHAO Xinjie.
Detection of application layer DDoS attacks based on clustering
[J]. Computer Engineering and Applications, 2016, 52(21): 116-120.
|
[6] |
ZHAO Xu, WANG Wei.
Multithreading model for multimedia packets in NIDS based on genetic algorithm
[J]. Computer Engineering and Applications, 2016, 52(14): 115-118.
|
[7] |
CHEN Ming1, WEN Ying1, TAN Tao2.
Intrusion detection system based on MDP and game theory in WSN
[J]. Computer Engineering and Applications, 2015, 51(9): 117-121.
|
[8] |
ZHAO Xu, WANG Wei.
Optimization research of DSAMDP method with dynamic programming theory
[J]. Computer Engineering and Applications, 2014, 50(22): 83-87.
|
[9] |
DANG Huazheng, FANG Xianjin.
Automatic data preprocessing technology for Dendritic Cell Algorithm
[J]. Computer Engineering and Applications, 2014, 50(19): 85-88.
|
[10] |
ZHANG Wei1, DONG Qunfeng2.
Design and implementation of cloud security comprehensive analysis system
[J]. Computer Engineering and Applications, 2014, 50(19): 89-94.
|
[11] |
DENG Zelin1, TAN Guanzheng2, HE Pei3.
Improved artificial immune recognition system and its performance analysis
[J]. Computer Engineering and Applications, 2014, 50(17): 16-19.
|
[12] |
WENG Guang’an.
Simulation dataset based study on byte frequency intrusion detection
[J]. Computer Engineering and Applications, 2014, 50(12): 96-99.
|
[13] |
HU Min1, HU Bo1, HUANG Hongmei2.
Multicast routing optimization based on immune Memetic algorithm
[J]. Computer Engineering and Applications, 2013, 49(2): 105-108.
|
[14] |
LEI Xiangyu, ZHOU Ping.
Research of support vector machine classifiers for intrusion detection
[J]. Computer Engineering and Applications, 2013, 49(11): 88-91.
|
[15] |
LIU Xiaoyong1, LIU Jun1, ZHAO Guirong1, MA Jing1, WANG Yongchao2.
Study on cooperation evolution model
[J]. Computer Engineering and Applications, 2012, 48(8): 51-54.
|