×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [3]
北京大学 [2]
大连理工大学 [1]
北京航空航天大学 [1]
四川大学 [1]
湖南大学 [1]
更多...
内容类型
期刊论文 [8]
会议论文 [1]
发表日期
2019 [1]
2017 [2]
2016 [2]
2015 [1]
2012 [2]
2010 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Support Vector Machine for Classification of Terrorist Attacks Based on Intelligent Tuned Harmony Search
期刊论文
EKOLOJI, 2019, 卷号: 28, 页码: 153-164
作者:
Bu, Bing
;
Pi, Zhenyang
;
Wang, Lei
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
terrorist attack
classification
support vector machine (SVM)
intelligent tuned harmony search (ITHS)
Accurate and efficient exploit capture and classification
期刊论文
Science China. Information Science, 2017
Ding Yu
;
Wei Tao
;
Xue Hui
;
Zhang Yulong
;
Zhang Chao
;
Han Xinhui
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
software security
exploit classification
exploit attack capture
control flow integrity
JIT security
Accurate and efficient exploit capture and classification
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
Ding, Yu
;
Wei, Tao
;
Xue, Hui
;
Zhang, Yulong
;
Zhang, Chao
;
Han, Xinhui
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
software security
exploit classification
exploit attack capture
control flow integrity
JIT security
SIGNATURES
Re-scale AdaBoost for attack detection in collaborative filtering recommender systems
期刊论文
KNOWLEDGE-BASED SYSTEMS, 2016, 卷号: 100, 期号: [db:dc_citation_issue], 页码: 74-88
作者:
Yang, Zhihai
;
Xu, Lin
;
Cai, Zhongmin
;
Xu, Zongben
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/02
Recommender system
Imbalanced classification
Re-scale Boosting
Attack detection
Detection rate
Network Attack Classification and Recognition Using HMM and Improved Evidence Theory
期刊论文
International Journal of Advanced Computer Science and Applications, 2016, 卷号: Vol.7 No.4, 页码: 31-38
作者:
Luo, G
;
Wen, Y
;
Xiang, LY
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
Hidden
Markov
Model
Evidence
theory
Network
attack
KDD
CUP99
Classification
User-Level Side Channel Attack on Workflow System in Data-Center
期刊论文
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, 页码: 1430-1435
作者:
Wang, Jihe
;
Qiu, Meikang
;
Guo, Bing
;
Shen, Yan
;
Li, Qiang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/02/25
Side channel attack
data-center
workflow system
DAG
classification
A new security model based on SVM classifier
期刊论文
ICIC Express Letters, Part B: Applications, 2012, 卷号: 3, 期号: [db:dc_citation_issue], 页码: 141-146
作者:
Wang, Hai-Sheng
;
Wang, Hai-Chen
;
Gui, Xiao-Lin
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/10
Bad quality
Classification control
Detection rates
Failure events
Malicious attack
Malicious nodes
Security model
Simulation experiments
SVM classifiers
Authentication Protocol Security Assessment Framework Based on Attack Classification
会议论文
International Conference on Electrical Information and Mechatronics (ICEIM), Jiaozuo, PEOPLES R CHINA, 2011-12-23
作者:
Wang, Hao
;
Tan, Guozhen
;
Liu, Lidong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/13
authentication protocol
attack classification
security assessment
Using cross entropy to detect and classify network anomalous traffic
期刊论文
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2010, 卷号: 44, 期号: [db:dc_citation_issue], 页码: 10-15
作者:
Yan, Ruoyu
;
Zheng, Qinghua
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/10
Anomaly detection
Attack classifications
Classification methods
Cross entropy
Exponentially weighted moving average
Exponentially weighted moving average control charts
Traffic anomaly detections
Traffic distributions
©版权所有 ©2017 CSpace - Powered by
CSpace