[1] |
CHEN Zhonglei, YI Peng, CHEN Xiang, HU Tao.
Real-time Anomaly Detection Framework via System Calls Based on Integrated Learning
[J]. Computer Engineering, 2023, 49(6): 162-169,179.
|
[2] |
XI Rongkang, CAI Manchun, LU Tianliang.
Tor Traffic Analysis Model Based on Data Enhancement and Stream Data Processing
[J]. Computer Engineering, 2023, 49(3): 177-184.
|
[3] |
SHI Lei, ZHANG Jitao, GAO Yufei, WEI Lin, TAO Yongcai.
Intrusion Detection of Network Traffic Based on Transformer and BiLSTM
[J]. Computer Engineering, 2023, 49(3): 29-36,57.
|
[4] |
LIU Qiang, ZHANG Ying, ZHOU Weixiang, JIANG Xiantao, ZHOU Weina, ZHOU Mouguo.
Adaptive Class Incremental Learning-Based IoT Intrusion Detection System
[J]. Computer Engineering, 2023, 49(2): 169-174.
|
[5] |
SUN Yangwei, QI Yong.
Intrusion Detection Method for In-Vehicle CAN Based on Cluster Mixed Sampling and PSO-Stacking
[J]. Computer Engineering, 2023, 49(1): 138-145.
|
[6] |
LIU Jinshuo, ZHAN Daiyi, DENG Juan, WANG Lina.
Network Intrusion Detection Based on Deep Neural Network and Federated Learning
[J]. Computer Engineering, 2023, 49(1): 15-21,30.
|
[7] |
DONG Weiyu, LI Haitao, WANG Ruimin, REN Huajuan, SUN Xuekai.
Network Traffic Anomaly Detection Model Based on Stacked Convolutional Attention
[J]. Computer Engineering, 2022, 48(9): 12-19.
|
[8] |
JIN Haibo, ZHAO Xinyue.
High-Reliability Intrusion Detection Algorithm Under Conformal Prediction Framework
[J]. Computer Engineering, 2022, 48(7): 130-140.
|
[9] |
SHENG Long, YUAN Lina, WU Nannan, JI Shaopei.
Network Anomaly Detection Model Based on GSA and DE Optimizing Hybrid Kernel ELM
[J]. Computer Engineering, 2022, 48(6): 146-153.
|
[10] |
LI Jinguo, JIAO Xubin.
Research on Intrusion Detection Model in Fog Computing Environment
[J]. Computer Engineering, 2022, 48(5): 43-52.
|
[11] |
GU Qingzhu, DONG Hongbin.
MI Loss Evaluation Model for k-Anonymity in PPDM
[J]. Computer Engineering, 2022, 48(4): 143-147.
|
[12] |
WANG Lu, LIU Xiaoqing, HE Zhenying.
Frequent Word Sequence Mining Algorithm in Continuous Time Interval
[J]. Computer Engineering, 2022, 48(2): 79-85,91.
|
[13] |
ZHANG Pan, GAO Feng, ZHOU Yi, RAO Hanyu, MAO Dong, LI Jing.
An Online Real-Time Anomaly Detection Method for Microservice Call Chains
[J]. Computer Engineering, 2022, 48(11): 161-169.
|
[14] |
WU Jun, OUYANG Aijia, ZHANG Lin.
Redundant Contrast Pattern Filtering Algorithm for Permutation Testing
[J]. Computer Engineering, 2022, 48(1): 75-84.
|
[15] |
WU Jun, OUYANG Aijia, ZHANG Lin.
Independent Exact Permutation Testing Algorithm for Distinguishing Sequential Pattern Discovery
[J]. Computer Engineering, 2021, 47(8): 45-53,61.
|