[1] |
Changhong YU, Ya LU, Haixin WANG, Ming GAO.
Traffic Classification Algorithm for IoT Device Based on Sliding Time Window
[J]. Computer Engineering, 2023, 49(7): 259-268.
|
[2] |
CHEN Zhonglei, YI Peng, CHEN Xiang, HU Tao.
Real-time Anomaly Detection Framework via System Calls Based on Integrated Learning
[J]. Computer Engineering, 2023, 49(6): 162-169,179.
|
[3] |
SHI Lei, ZHANG Jitao, GAO Yufei, WEI Lin, TAO Yongcai.
Intrusion Detection of Network Traffic Based on Transformer and BiLSTM
[J]. Computer Engineering, 2023, 49(3): 29-36,57.
|
[4] |
LIU Qiang, ZHANG Ying, ZHOU Weixiang, JIANG Xiantao, ZHOU Weina, ZHOU Mouguo.
Adaptive Class Incremental Learning-Based IoT Intrusion Detection System
[J]. Computer Engineering, 2023, 49(2): 169-174.
|
[5] |
SUN Yangwei, QI Yong.
Intrusion Detection Method for In-Vehicle CAN Based on Cluster Mixed Sampling and PSO-Stacking
[J]. Computer Engineering, 2023, 49(1): 138-145.
|
[6] |
LIU Jinshuo, ZHAN Daiyi, DENG Juan, WANG Lina.
Network Intrusion Detection Based on Deep Neural Network and Federated Learning
[J]. Computer Engineering, 2023, 49(1): 15-21,30.
|
[7] |
DONG Weiyu, LI Haitao, WANG Ruimin, REN Huajuan, SUN Xuekai.
Network Traffic Anomaly Detection Model Based on Stacked Convolutional Attention
[J]. Computer Engineering, 2022, 48(9): 12-19.
|
[8] |
JIN Haibo, ZHAO Xinyue.
High-Reliability Intrusion Detection Algorithm Under Conformal Prediction Framework
[J]. Computer Engineering, 2022, 48(7): 130-140.
|
[9] |
SHENG Long, YUAN Lina, WU Nannan, JI Shaopei.
Network Anomaly Detection Model Based on GSA and DE Optimizing Hybrid Kernel ELM
[J]. Computer Engineering, 2022, 48(6): 146-153.
|
[10] |
LI Jinguo, JIAO Xubin.
Research on Intrusion Detection Model in Fog Computing Environment
[J]. Computer Engineering, 2022, 48(5): 43-52.
|
[11] |
CUI Jingyang, CHEN Zhenguo, TIAN Liqin, ZHANG Guanghua.
Overview of User and Entity Behavior Analytics Technology Based on Machine Learning
[J]. Computer Engineering, 2022, 48(2): 10-24.
|
[12] |
SUN Pengyu, ZHANG Hengwei, TAN Jinglei, LI Chenwei, MA Junqiang, WANG Jindong.
Network Security Defense Decision Method Based on Time Game
[J]. Computer Engineering, 2022, 48(11): 145-151.
|
[13] |
NI Siyuan, HU Hongchao, LIU Wenyan, LIANG Hao.
Heterogeneous Cloud Resource Allocation Algorithm Based on Rotation Strategy
[J]. Computer Engineering, 2021, 47(6): 44-51,67.
|
[14] |
YANG Yanli, SONG Lipeng.
Attack Graph Generation Method Integrating Social Network Threats
[J]. Computer Engineering, 2021, 47(5): 104-116.
|
[15] |
WANG Zi, WANG Zhihua, HAN Yong, JIN Jianlong, HUANG Tianming, ZHU Jiang.
Research on Mulit-Layer Cooperative Defense Model Oriented to Network Security of Power System
[J]. Computer Engineering, 2021, 47(12): 131-140.
|