[1] |
Zhou Hang, Zhan Yongzhao, Mao Qirong.
Video Anomaly Detection Based on Space-Time Fusion Graph Network Learning
[J]. Journal of Computer Research and Development, 2021, 58(1): 48-59.
|
[2] |
Zhang Shenglin, Li Dongwen, Sun Yongqian, Meng Weibin, Zhang Yuzhe, Zhang Yuzhi, Liu Ying, Pei Dan.
Unified Anomaly Detection for Syntactically Diverse Logs in Cloud Datacenter
[J]. Journal of Computer Research and Development, 2020, 57(4): 778-790.
|
[3] |
Zhang Long, Wang Jinsong.
DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918.
|
[4] |
Xi Liang, Wang Yong, Zhang Fengbin.
Anomaly Detection Algorithm Based on FCM with Adaptive Artificial Fish-Swarm
[J]. Journal of Computer Research and Development, 2019, 56(5): 1048-1059.
|
[5] |
Chen Xingshu, Chen Jiaxin, Jin Xin, Ge Long.
Process Abnormal Detection Based on System Call Vector Space in Cloud Computing Environments
[J]. Journal of Computer Research and Development, 2019, 56(12): 2684-2693.
|
[6] |
Shi Leyi, Zhu Hongqiang, Liu Yihao, Liu Jia.
Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM
[J]. Journal of Computer Research and Development, 2019, 56(11): 2330-2338.
|
[7] |
Han Dongming,Guo Fangzhou,Pan Jiacheng,Zheng Wenting,Chen Wei.
Visual Analysis for Anomaly Detection in Time-Series: A Survey
[J]. Journal of Computer Research and Development, 2018, 55(9): 1843-1852.
|
[8] |
Ni Mingtao, Zhao Bo, Wu Fusheng, Fan Peiru.
CREBAD: Chip Radio Emission Based Anomaly Detection Scheme of IoT Devices
[J]. Journal of Computer Research and Development, 2018, 55(7): 1451-1461.
|
[9] |
Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang.
Intrusion Detection Techniques for Industrial Control Systems
[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054.
|
[10] |
Wen Kun,Yang Jiahai,Cheng Fengjuan,Yin Hui, Wang Jianfeng.
MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network
[J]. Journal of Computer Research and Development, 2015, 52(4): 813-822.
|
[11] |
Tang Chenghua, Liu Pengcheng, Tang Shensheng, Xie Yi.
Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection
[J]. Journal of Computer Research and Development, 2015, 52(3): 718-728.
|
[12] |
Wang Nan, Han Jizhong, and Fang Jinyun.
A Log Anomaly Detection Algorithm for Debugging Based on Grammar-Based Codes
[J]. , 2013, 50(4): 677-685.
|
[13] |
Li Chao, Tian Xinguang, Xiao Xi, and Duan Miyi,.
Anomaly Detection of User Behavior Based on Shell Commands and Co-Occurrence Matrix
[J]. , 2012, 49(9): 1982-1990.
|
[14] |
Zheng Liming, Zou Peng, Han Weihong, Li Aiping, and Jia Yan.
Traffic Anomaly Detection Using Multi-Dimensional Entropy Classification in Backbone Network
[J]. , 2012, 49(9): 1972-1981.
|
[15] |
Li Zhen, Tian Junfeng, and Yang Xiaohui.
Program Behavior Monitoring Based on System Call Attributes
[J]. , 2012, 49(8): 1676-1684.
|