咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献

馆藏范围

  • 21 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 15 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 信息与通信工程
    • 2 篇 公安技术
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 交通运输工程
  • 12 篇 管理学
    • 12 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 物理学

主题

  • 21 篇 network traffic
  • 2 篇 monitoring syste...
  • 2 篇 traffic monitori...
  • 2 篇 prediction
  • 1 篇 industrial contr...
  • 1 篇 self-similar
  • 1 篇 traffic conditio...
  • 1 篇 intrusion and an...
  • 1 篇 lstm
  • 1 篇 lyapunov exponen...
  • 1 篇 application prot...
  • 1 篇 improved artific...
  • 1 篇 integrated devel...
  • 1 篇 maximum likeliho...
  • 1 篇 wpt
  • 1 篇 energy interconn...
  • 1 篇 anomaly detectio...
  • 1 篇 time granularity
  • 1 篇 traffic characte...
  • 1 篇 abnormal behavio...

机构

  • 1 篇 school of comput...
  • 1 篇 daqsoft co. ltd ...
  • 1 篇 state key labora...
  • 1 篇 department of in...
  • 1 篇 school of inform...
  • 1 篇 school of manage...
  • 1 篇 school of mechan...
  • 1 篇 research institu...
  • 1 篇 department of co...
  • 1 篇 key laboratory o...
  • 1 篇 school of comput...
  • 1 篇 microsoft corpor...
  • 1 篇 global energy in...
  • 1 篇 security enginee...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 beijing key labo...
  • 1 篇 henan vocational...
  • 1 篇 information secu...
  • 1 篇 department of co...

作者

  • 1 篇 wang yanhong
  • 1 篇 yu xia
  • 1 篇 el-sayed m.el-ke...
  • 1 篇 yangrong chen
  • 1 篇 abdelaziz a.abde...
  • 1 篇 shuang du
  • 1 篇 d.l.elsheweikh
  • 1 篇 si jianpeng
  • 1 篇 guogen wan
  • 1 篇 june li
  • 1 篇 li rui
  • 1 篇 li shujiang
  • 1 篇 jinyu xiao
  • 1 篇 jiazhong lu
  • 1 篇 ghalib h.alshamm...
  • 1 篇 yan du
  • 1 篇 ma tiantian
  • 1 篇 peilin he
  • 1 篇 ruiwen zhang
  • 1 篇 袁静

语言

  • 19 篇 英文
  • 2 篇 中文
检索条件"主题词=Network traffic"
21 条 记 录,以下是1-10 订阅
排序:
network traffic prediction method based on improved ABC algorithm optimized EM-ELM
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2018年 第3期25卷 33-44页
作者: Tian Zhongda Li Shujiang Wang Yanhong Wang Xiangdong School of Information Science and Engineering Shenyang University of Technology
In order to overcome the poor generalization ability and low accuracy of traditional network traffic prediction methods, a prediction method based on improved artificial bee colony (ABC) algorithm optimized error mi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
network traffic Based on GARCH-M Model and Extreme Value Theory
收藏 引用
Transactions of Tianjin University 2005年 第5期11卷 386-390页
作者: 沈菲 王洪礼 史道济 李栋 School of Sciences Tianjin University School of Mechanical Engineering Tianjin University School of Management Tianjin University
GARCH-M ( generalized autoregressive conditional heteroskedasticity in the mean) model is used to analyse the volatility clustering phenomenon in mobile communication network traffic. Normal distribution, t distributi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Small-time scale network traffic prediction based on a local support vector machine regression model
收藏 引用
Chinese Physics B 2009年 第6期18卷 2194-2199页
作者: 孟庆芳 陈月辉 彭玉华 School of Information Science and Engineering University of Jinan School of Information Science and Engineering Shandong University
In this paper we apply the nonlinear time series analysis method to small-time scale traffic measurement data. The prediction-based method is used to determine the embedding dimension of the traffic data. Based on the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Chaotic Control of network traffic
收藏 引用
China Communications 2010年 第5期7卷 112-119页
作者: Yang Tan Guo Shize Jin Yuehui Cheng Shiduan School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 P. R. China State Key Laboratory of networking and Switching Beijing University of Posts and Telecommunications Beijing 100876 P. R. China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 P. R. China
This paper presents a chaotic control method on network traffic. By this method, the chaotic network traffic can be controlled to pre-assigned equifibrium point according to chaotic prediction and the Largest Lyapunov... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
RRCNN: Request Response-Based Convolutional Neural network for ICS network traffic Anomaly Detection
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5743-5759页
作者: Yan Du Shibin Zhang Guogen Wan Daohua Zhou Jiazhong Lu Yuanyuan Huang Xiaoman Cheng Yi Zhang Peilin He Country School of Cybersecurity Chengdu University of Information TechnologyChengdu610225China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225China DAQSOFT CO. LTDChengdu610213China Communication and Information Technology Center Petro China Southwest Oil and Gas CompanyChengdu610057China School of Computing and Information University of PittsburghPittsburgh152607PAUSA
Nowadays,industrial control system(ICS)has begun to integrate with the *** the Internet has brought convenience to ICS,it has also brought severe security *** ICS network traffic anomaly detection methods rely on stat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
WPANFIS:combine fuzzy neural network with multiresolution for network traffic prediction
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第4期17卷 88-93页
作者: LI Rui CHEN Jian-ya LIU Yun-jie WANG Zhen-kai School of Information and Telecommunication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China China Unicorn Beijing 100140 China
A novel methodology for prediction of network traffic, WPANFIS, which relies on wavelet packet transform (WPT) for multi-resolution analysis and adaptive neuro-fuzzy inference system (ANFIS) is proposed in this ar... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Reducing network traffic of Token Protocol Using Sharing Relation Cache
收藏 引用
Tsinghua Science and Technology 2007年 第6期12卷 691-699页
作者: 王海霞 汪东升 李鹏 王惊雷 李崇民 Research Institute of Information Technology National Laboratory for Information Science and Technology Tsinghua University
Token protocol provides a new coherence framework for shared-memory multiprocessor systems. It avoids indirections of directory protocols for common cache-to-cache transfer misses, and achieves higher interconnect ban... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Study of network traffic Analysis Model Based on Time Granularity
收藏 引用
微计算机信息 2005年 第8期 7-9页
作者: Tan,Xiaoling Xu,Yong Mei,Chenggang Liu,Lan (Dept. of Electronic Engineering , Chongqing Three Gorges Univ. , Chongqing 404000 , China) (Guangdong Key Laboratory of Computer network, South China Univ. of Tech., Guangzhou 510640,China) (dept. of the engineering of electronic information, Guangdong Polytechnic Normal Univ.,Guangzhou 510655 , China )
An analytic research on establishing different traffic models on the traffic nature of different time granularity can provide necessary academic foundation for network design and simulation as well as ensuring the qua... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Effective network traffic Data Control Using Improved Apriori Rule Mining
收藏 引用
Circuits and Systems 2016年 第10期7卷 3162-3173页
作者: Subbiyan Prakash Murugasamy Vijayakumar Department of Information Technology Sri Shakthi Institute of Engineering and Technology Coimbatore India Department of Computer Science and Engineering Nandha College of Technology Erode India
The increasing usage of internet requires a significant system for effective communication. To pro- vide an effective communication for the internet users, based on nature of their queries, shortest routing path is us... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
ON THE TESTING FOR ALPHA-STABLE DISTRIBUTIONS OF ETHERNET network traffic
收藏 引用
Journal of Electronics(China) 2003年 第4期20卷 309-312页
作者: Ge Xiaohu Zhu Guanxi Zhu Yaoting (Electron. & Info. Eng. Dept., Huazhong Univ. of Sci. & Tech., Wuhan 430074) Electron. & Info. Eng. Dept. Huazhong Univ. of Sci. & Tech. Wuhan
The modeling of network traffic is important for the design and application of networks, but little is known as to the characteristics of distribution of packets in network traffic. In this letter the distribution of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论