CORC

浏览/检索结果: 共9条,第1-9条 帮助

已选(0)清除 条数/页:   排序方式:
Support Vector Machine for Classification of Terrorist Attacks Based on Intelligent Tuned Harmony Search 期刊论文
EKOLOJI, 2019, 卷号: 28, 页码: 153-164
作者:  Bu, Bing;  Pi, Zhenyang;  Wang, Lei
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
Accurate and efficient exploit capture and classification 期刊论文
Science China. Information Science, 2017
Ding Yu; Wei Tao; Xue Hui; Zhang Yulong; Zhang Chao; Han Xinhui
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Accurate and efficient exploit capture and classification 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
Ding, Yu; Wei, Tao; Xue, Hui; Zhang, Yulong; Zhang, Chao; Han, Xinhui
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Re-scale AdaBoost for attack detection in collaborative filtering recommender systems 期刊论文
KNOWLEDGE-BASED SYSTEMS, 2016, 卷号: 100, 期号: [db:dc_citation_issue], 页码: 74-88
作者:  Yang, Zhihai;  Xu, Lin;  Cai, Zhongmin;  Xu, Zongben
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/02
Network Attack Classification and Recognition Using HMM and Improved Evidence Theory 期刊论文
International Journal of Advanced Computer Science and Applications, 2016, 卷号: Vol.7 No.4, 页码: 31-38
作者:  Luo, G;  Wen, Y;  Xiang, LY
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/31
User-Level Side Channel Attack on Workflow System in Data-Center 期刊论文
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, 页码: 1430-1435
作者:  Wang, Jihe;  Qiu, Meikang;  Guo, Bing;  Shen, Yan;  Li, Qiang
收藏  |  浏览/下载:5/0  |  提交时间:2019/02/25
A new security model based on SVM classifier 期刊论文
ICIC Express Letters, Part B: Applications, 2012, 卷号: 3, 期号: [db:dc_citation_issue], 页码: 141-146
作者:  Wang, Hai-Sheng;  Wang, Hai-Chen;  Gui, Xiao-Lin
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/10
Authentication Protocol Security Assessment Framework Based on Attack Classification 会议论文
International Conference on Electrical Information and Mechatronics (ICEIM), Jiaozuo, PEOPLES R CHINA, 2011-12-23
作者:  Wang, Hao;  Tan, Guozhen;  Liu, Lidong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/13
Using cross entropy to detect and classify network anomalous traffic 期刊论文
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2010, 卷号: 44, 期号: [db:dc_citation_issue], 页码: 10-15
作者:  Yan, Ruoyu;  Zheng, Qinghua
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/10


©版权所有 ©2017 CSpace - Powered by CSpace