[1] |
YU Enze, Nurbol, YU Qing.
Phishing Website Detection Method Based on Integrated Learning
[J]. Computer Engineering and Applications, 2019, 55(18): 81-88.
|
[2] |
LIU Haiyan, ZHANG Yu, BI Jianquan, XING Meng.
Review of technology based on distributed and collaborative network intrusion detection
[J]. Computer Engineering and Applications, 2018, 54(8): 1-6.
|
[3] |
WANG Qi1,2,3, LU Yuhai1,3, LIU Yang1,3, LIU Yanbing1,3, TAN Jianlong1,3, SUN Bo4.
Dynamical adaptive Karp-Rabin multi-pattern matching algorithm
[J]. Computer Engineering and Applications, 2017, 53(4): 39-44.
|
[4] |
SI Jian, CHEN Peng, GU Ningping, SUN Lingfeng, WANG Weimin.
Network attack graph backward depth-first building algorithm
[J]. Computer Engineering and Applications, 2017, 53(3): 131-137.
|
[5] |
LV Xuefeng1,2, JIANG Liehui1,2, MENG Huan2.
Cyber threats and intrusion detection for MODBUS-based SCADA system
[J]. Computer Engineering and Applications, 2017, 53(24): 122-128.
|
[6] |
DING Yan, Nurbol.
Phishing detection method based on URL obfuscation technology recognition
[J]. Computer Engineering and Applications, 2017, 53(20): 75-82.
|
[7] |
SUN Jian, LIU Yuan, ZHAO Xinjie.
Detection of application layer DDoS attacks based on clustering
[J]. Computer Engineering and Applications, 2016, 52(21): 116-120.
|
[8] |
ZHAO Xu, WANG Wei.
Multithreading model for multimedia packets in NIDS based on genetic algorithm
[J]. Computer Engineering and Applications, 2016, 52(14): 115-118.
|
[9] |
CHEN Ming1, WEN Ying1, TAN Tao2.
Intrusion detection system based on MDP and game theory in WSN
[J]. Computer Engineering and Applications, 2015, 51(9): 117-121.
|
[10] |
ZHAO Xu, WANG Wei.
Optimization research of DSAMDP method with dynamic programming theory
[J]. Computer Engineering and Applications, 2014, 50(22): 83-87.
|
[11] |
ZENG Chuanhuang, HUANG Kan.
Research and implementation of new method on increasing speed of rule-matching in Snort
[J]. Computer Engineering and Applications, 2014, 50(22): 102-105.
|
[12] |
ZHANG Wei1, DONG Qunfeng2.
Design and implementation of cloud security comprehensive analysis system
[J]. Computer Engineering and Applications, 2014, 50(19): 89-94.
|
[13] |
WENG Guang’an.
Simulation dataset based study on byte frequency intrusion detection
[J]. Computer Engineering and Applications, 2014, 50(12): 96-99.
|
[14] |
LEI Xiangyu, ZHOU Ping.
Research of support vector machine classifiers for intrusion detection
[J]. Computer Engineering and Applications, 2013, 49(11): 88-91.
|
[15] |
YAN Hongwen.
Research on improved BMH single-pattern matching algorithm based on Snort
[J]. Computer Engineering and Applications, 2012, 48(31): 78-81.
|