[1] |
Zhou Wen, Zhang Shikun, Ding Yong, Chen Xi.
Adversarial Example Attack Analysis of Low-Dimensional Industrial Control Network System Dataset
[J]. Journal of Computer Research and Development, 2020, 57(4): 736-745.
|
[2] |
Wang Ting, Wang Na, Cui Yunpeng, Li Huan.
The Optimization Method of Wireless Network Attacks Detection Based on Semi-Supervised Learning
[J]. Journal of Computer Research and Development, 2020, 57(4): 791-802.
|
[3] |
Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin.
An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests
[J]. Journal of Computer Research and Development, 2019, 56(3): 566-575.
|
[4] |
Sun Xiaowan, Wang Ying, Wang Xin, Sun Yudong.
Aspect-Based Sentiment Analysis Model Based on Dual-Attention Networks
[J]. Journal of Computer Research and Development, 2019, 56(11): 2384-2395.
|
[5] |
Yang An, Hu Yan, Zhou Liang, Zheng Weimin, Shi Zhiqiang, Sun Limin.
An Industrial Control System Anomaly Detection Algorithm Fusion by Information Flow and State Flow
[J]. Journal of Computer Research and Development, 2018, 55(11): 2532-2542.
|
[6] |
Xu Mengfan, Li Xinghua, Liu Hai, Zhong Cheng, Ma Jianfeng.
An Intrusion Detection Scheme Based on Semi-Supervised Learning and Information Gain Ratio
[J]. Journal of Computer Research and Development, 2017, 54(10): 2255-2267.
|
[7] |
Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang.
Intrusion Detection Techniques for Industrial Control Systems
[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054.
|
[8] |
Dong Hongbin, Teng Xuyang,Yang Xue.
Feature Selection Based on the Measurement of Correlation Information Entropy
[J]. Journal of Computer Research and Development, 2016, 53(8): 1684-1695.
|
[9] |
Wang Yichuan, Ma Jianfeng, Lu Di,Zhang Liumei,Meng Xianjia.
Game Optimization for Internal DDoS Attack Detection in Cloud Computing
[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882.
|
[10] |
Wang Bo, Nie Xiaowei.
Multi-Criteria Mathematical Programming Based Method on Network Intrusion Detection
[J]. Journal of Computer Research and Development, 2015, 52(10): 2239-2246.
|
[11] |
Zhu Kenan, Yin Baolin, Mao Yaming, and Hu Yingnan.
Malware Classification Approach Based on Valid Window and Naive Bayes
[J]. Journal of Computer Research and Development, 2014, 51(2): 373-381.
|
[12] |
Feng Xuewei, Wang Dongxia, Huang Minhuan, Li Jin.
A Mining Approach for Causal Knowledge in Alert Correlating Based on the Markov Property
[J]. Journal of Computer Research and Development, 2014, 51(11): 2493-2504.
|
[13] |
Tian Zhihong, Wang Bailing, Zhang Weizhe, Ye Jianwei, and Zhang Hongli.
Network Intrusion Detection Model Based on Context Verification
[J]. , 2013, 50(3): 498-508.
|
[14] |
Yang Shilai, Yang Yahui, Shen Qingni, and Huang Haizhen.
A Method of Intrusion Detection Based on Semi-Supervised GHSOM
[J]. , 2013, 50(11): 2375-2382.
|
[15] |
Li Chao, Tian Xinguang, Xiao Xi, and Duan Miyi,.
Anomaly Detection of User Behavior Based on Shell Commands and Co-Occurrence Matrix
[J]. , 2012, 49(9): 1982-1990.
|