[1] |
Changhong YU, Ya LU, Haixin WANG, Ming GAO.
Traffic Classification Algorithm for IoT Device Based on Sliding Time Window
[J]. Computer Engineering, 2023, 49(7): 259-268.
|
[2] |
WANG Zhijiang, QIN Pinle, CHAI Rui, WU Feng, CHENG Yitong, SHI Yue.
Automatic Identification Method of Tooth Impaction Based on Deep Learning
[J]. Computer Engineering, 2022, 48(4): 307-313.
|
[3] |
CUI Jingyang, CHEN Zhenguo, TIAN Liqin, ZHANG Guanghua.
Overview of User and Entity Behavior Analytics Technology Based on Machine Learning
[J]. Computer Engineering, 2022, 48(2): 10-24.
|
[4] |
SUN Pengyu, ZHANG Hengwei, TAN Jinglei, LI Chenwei, MA Junqiang, WANG Jindong.
Network Security Defense Decision Method Based on Time Game
[J]. Computer Engineering, 2022, 48(11): 145-151.
|
[5] |
NI Siyuan, HU Hongchao, LIU Wenyan, LIANG Hao.
Heterogeneous Cloud Resource Allocation Algorithm Based on Rotation Strategy
[J]. Computer Engineering, 2021, 47(6): 44-51,67.
|
[6] |
YANG Yanli, SONG Lipeng.
Attack Graph Generation Method Integrating Social Network Threats
[J]. Computer Engineering, 2021, 47(5): 104-116.
|
[7] |
WANG Hai, WENG Chenao, LI Ke, LUO Xi.
An Improved SVM Algorithm for Azimuth Estimation of Base Station Sector
[J]. Computer Engineering, 2021, 47(4): 120-126.
|
[8] |
ZHANG Bingyu, PAN Qing, TIAN Nili, Everett Xiaolin Wang.
A Source Number Estimation Method Based on Multiple Feature Fusion
[J]. Computer Engineering, 2021, 47(4): 115-119,126.
|
[9] |
WANG Zi, WANG Zhihua, HAN Yong, JIN Jianlong, HUANG Tianming, ZHU Jiang.
Research on Mulit-Layer Cooperative Defense Model Oriented to Network Security of Power System
[J]. Computer Engineering, 2021, 47(12): 131-140.
|
[10] |
YANG Lin, WANG Yongjie.
Network Defense Strategy Selection Method Based on Single-Point Multi-Step Game
[J]. Computer Engineering, 2021, 47(1): 154-164.
|
[11] |
LIAN Xiaowei, MA Yao, CHEN Yongle, ZHANG Zhuangzhuang, WANG Jianhua.
Shodan Traffic Identification Based on Load Characteristics and Statistical Characteristics
[J]. Computer Engineering, 2021, 47(1): 117-122.
|
[12] |
YUAN Zheming, YANG Jingjing, CHEN Yuan.
Feature Selection Method Based on Maximum Information Coefficient and Redundancy Sharing
[J]. Computer Engineering, 2020, 46(8): 101-105.
|
[13] |
DING Huadong, XU Huahu, DUAN Ran, CHEN Fan.
Network Security Situation Awareness Model Based on Bayesian Method
[J]. Computer Engineering, 2020, 46(6): 130-135.
|
[14] |
LI Li, SONG Song, LI Bingke.
Weight Search and Alarm Selection Method Based on User Preference
[J]. Computer Engineering, 2020, 46(4): 107-114.
|
[15] |
FU Zixi, XU Yang, WU Zhaodi, XU Dandan, XIE Xiaoyao.
SVM-KNN Network Intrusion Detection Method Based on Incremental Learning
[J]. Computer Engineering, 2020, 46(4): 115-122.
|