[1] |
PAN Yu-qing, ZHANG Su-ning, FENG Ren-jun, JING Dong-sheng.
Intrusion Detection Method Based on Particle Swarm Optimization Combined with LightGBM
[J]. Computer and Modernization, 2023, 0(04): 123-126.
|
[2] |
RAO Hai-bing, ZHU Su-lei, YANG Chun-xia.
Network Intrusion Detection Model Based on Space-time Feature Fusion and Attention Mechanism
[J]. Computer and Modernization, 2022, 0(06): 116-121.
|
[3] |
WU Shui-ming, JI Zhi-yuan, WANG Zhen-yu, JING Dong-sheng.
Power Information Network Intrusion Detection Algorithm Based on Dueling-DDQN
[J]. Computer and Modernization, 2021, 0(12): 43-47.
|
[4] |
DENG Bin-tao, XU Sheng-chao.
A Differential Evolution K-mediods Clustering Algorithm Based on Dynamic Gemini Population
[J]. Computer and Modernization, 2021, 0(07): 54-59.
|
[5] |
YAN Rui-an, ZHANG Li-chen.
Intrusion Detection Based on Focal Loss and Convolutional Neural Network
[J]. Computer and Modernization, 2021, 0(01): 65-69.
|
[6] |
ZHANG Yu1,2, GUO Chun1,2, SHEN Guo-wei1,2, PING Yuan3.
An IDS Alerts Preprocessing Method Based on Information Entropy
[J]. Computer and Modernization, 2020, 0(05): 111-.
|
[7] |
LI He-ting, FENG Ren-jun, CHEN Hai-yan, JING Dong-sheng.
Intrusion Detection Based on Heterogeneous Convolutional Neural Network
[J]. Computer and Modernization, 2019, 0(10): 117-.
|
[8] |
ZHANG Su-ning, WANG Yue-juan, WU Shui-ming, JING Dong-sheng.
Network Intrusion Data Clustering Algorithm Based on Krylov Subspace
[J]. Computer and Modernization, 2019, 0(10): 121-.
|
[9] |
JI Tian-ming1, ZHUANG Ling2, YU Jun1, ZHU Guang-xin1, WANG Zhao1, MIAO Jing-wen1.
An Entropy Weight Fusion Localization Algorithm for #br# Terminal Intrusion Detection in Substation
[J]. Computer and Modernization, 2019, 0(04): 114-.
|
[10] |
CHU Gui-yang.
Wireless Mesh Network Intrusion Detection Algorithm Based on Link Complete Coverage
[J]. Computer and Modernization, 2017, 0(2): 61-66.
|
[11] |
LI Peng, ZHOU Wen-huan.
Mixed Intrusion Detection Algorithm Based on k-means and Decision Tree
[J]. Computer and Modernization, 2017, 0(12): 12-16.
|
[12] |
ZHENG Shengjun1, XIA Yechao2,3, LI Jianhua2,3, WANG Li1, WANG Hongkai4.
Intrusion Detection System Based on Integration of #br#
Various Detection Technologies
[J]. Computer and Modernization, 2016, 0(5): 116-121.
|
[13] |
MEI Xiao-hui, LONG Yuan, ZHANG Jian-bo.
Application of Local Outlier Mining Based on Cluster Merging Algorithm in Intrusion Detection
[J]. Computer and Modernization, 2015, 0(8): 67-70.
|
[14] |
REN Changrong.
An Optimized KFCM Algorithm in Intrusion Detection Based on MCQPSOSA
[J]. Computer and Modernization, 2015, 0(2): 90-.
|
[15] |
SHEN Lixiang1, CAO Guo2.
Intrusion Detection Data Classification by Distributed Computing
[J]. Computer and Modernization, 2015, 0(12): 43-.
|