[1] |
LIU Xing1, 2, GUO Liang1, 2, WANG Zhengqi1, 2, WEI Xiaogang1, 2, XU Xuefei1, 2, LIU Jing3.
Q-learning-based Algorithm for Orchestrating Security Service Function Chain
[J]. Computer and Modernization, 2024, 0(11): 34-40.
|
[2] |
WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling.
Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology
[J]. Computer and Modernization, 2024, 0(01): 1-5.
|
[3] |
YANG Jun, WANG Jin-lin, NI Hong, SHENG Yi-qiang, .
Dynamic Transfer Method Based on Sensitivity in Industrial Control Network Anomaly Detection
[J]. Computer and Modernization, 2023, 0(05): 46-51.
|
[4] |
MAO Ming-yang, XU Sheng-chao.
A New Active Defense Model for Complex Network Security
[J]. Computer and Modernization, 2023, 0(04): 118-122.
|
[5] |
PAN Yu-qing, ZHANG Su-ning, FENG Ren-jun, JING Dong-sheng.
Intrusion Detection Method Based on Particle Swarm Optimization Combined with LightGBM
[J]. Computer and Modernization, 2023, 0(04): 123-126.
|
[6] |
CHU Su-hong, LIU Lei, .
POF Protocol Parser
[J]. Computer and Modernization, 2022, 0(09): 93-98.
|
[7] |
WU Shui-ming, JI Zhi-yuan, WANG Zhen-yu, JING Dong-sheng.
Power Information Network Intrusion Detection Algorithm Based on Dueling-DDQN
[J]. Computer and Modernization, 2021, 0(12): 43-47.
|
[8] |
ZHANG Wen-bo, HU Xi-ming, LI Peng, MA Miao, WANG Tao, .
Design and Implementation of Security Experiment of Internet of Things Based on Smart Phone and Smart Home Appliances for New Engineering Disciplines#br#
[J]. Computer and Modernization, 2021, 0(04): 109-116.
|
[9] |
HAO Yi-ran, SHENG Yi-qiang, WANG Jing-lin, .
Anomaly Detection of Network Traffic Based on t-SNE Dimensionality Reduction Preprocessing
[J]. Computer and Modernization, 2021, 0(02): 109-116.
|
[10] |
YAN Rui-an, ZHANG Li-chen.
Intrusion Detection Based on Focal Loss and Convolutional Neural Network
[J]. Computer and Modernization, 2021, 0(01): 65-69.
|
[11] |
LIAO Zu-qi, LI Fei, ZHANG Peng-fei.
CBR-based Emergency Response System and Method for Internet of Vehicle Security
[J]. Computer and Modernization, 2020, 0(11): 109-116.
|
[12] |
DAI Song, SUN Yan-tao, LIU Qiang, JIA Ze-qun, .
Networking Method for SDMANET Based on Multi-mode Radio
[J]. Computer and Modernization, 2020, 0(08): 82-88.
|
[13] |
DAI Rui-feng.
Model Construction of College Network Security System Based on SSL Virtual Technology
[J]. Computer and Modernization, 2020, 0(08): 122-126.
|
[14] |
CUI Wen-di, DUAN Peng-fei, ZHU Hong-qiang, LIU Na.
Security Risk Assessmenton of Attack Graph and HMM Industrial Control Network
[J]. Computer and Modernization, 2020, 0(07): 32-37.
|
[15] |
LI He-ting, FENG Ren-jun, CHEN Hai-yan, JING Dong-sheng.
Intrusion Detection Based on Heterogeneous Convolutional Neural Network
[J]. Computer and Modernization, 2019, 0(10): 117-.
|