[1] |
PENG Chunyan, DU Xiujuan.
Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(2): 76-81.
|
[2] |
GOU Jijun, LI Junhua, CHEN Chen, CHEN Yiming, LV Yida.
Network Intrusion Detection Method Based on Random Forest
[J]. Computer Engineering and Applications, 2020, 56(2): 82-88.
|
[3] |
ZHOU Long, WANG Chen, SHI Yin.
Research of Webshell Detection Based on RNN
[J]. Computer Engineering and Applications, 2020, 56(14): 88-92.
|
[4] |
WU Depeng, LIU Yi.
Intrusion Detection Model Based on Self-Organizing Map of Variable Network Structure
[J]. Computer Engineering and Applications, 2020, 56(12): 81-86.
|
[5] |
SHI Leyi, LIU Jia, LIU Yihao, ZHU Hongqiang, DUAN Pengfei.
Survey of Research on Network Security Situation Awareness
[J]. Computer Engineering and Applications, 2019, 55(24): 1-9.
|
[6] |
ZHANG Shujuan1, ZHANG Juan2.
Dynamical Modeling and Analysis of Passive Worms Propagation in P2P Networks
[J]. Computer Engineering and Applications, 2019, 55(11): 60-66.
|
[7] |
MA Zhanfei1, YANG Jin2, JIN Yi2, BIAN Qi3.
Network Intrusion Detection Method Based on IQPSO-IDE Algorithm
[J]. Computer Engineering and Applications, 2019, 55(10): 115-120.
|
[8] |
FENG Bo1, GUO Fan2, TAN Suwen3.
Attack source traceback scheme based on probabilistic packet marking for IPv6 network
[J]. Computer Engineering and Applications, 2016, 52(6): 102-106.
|
[9] |
WU Luqing, WANG Ze.
Security design based on location key for mobile Ad-Hoc networks
[J]. Computer Engineering and Applications, 2016, 52(16): 132-136.
|
[10] |
CHEN Hong1, WANG Fei1, XIAO Zhenjiu1,2, SUN Lina1.
Network security situation assessment model fusing multi-source data
[J]. Computer Engineering and Applications, 2015, 51(17): 96-101.
|
[11] |
CHEN Hong1, WANG Fei1, XIAO Zhenjiu1,2, SUN Lina1.
Method of network security situation prediction based on IHS_LSSVR
[J]. Computer Engineering and Applications, 2014, 50(23): 91-94.
|
[12] |
CHENG Ke, SONG Haisheng, AN Zhanfu, KONG Yongsheng.
Method for evaluation of network security risk based on t-SVR with parameters optimization by GA
[J]. Computer Engineering and Applications, 2014, 50(12): 91-95.
|
[13] |
ZHU Lin, ZHU Canshi.
Data stream sliding window clustering algorithm applied in IDS
[J]. Computer Engineering and Applications, 2014, 50(1): 87-90.
|
[14] |
HE Yongming.
Assessment model of network security situation based on K Nearest Neighbor and Support Vector Machine
[J]. Computer Engineering and Applications, 2013, 49(9): 81-84.
|
[15] |
OUYANG Chenxing1,TAN Liang1,2.
New propagation model of Botnet on scale-free network
[J]. Computer Engineering and Applications, 2013, 49(9): 110-114.
|