咨询与建议

限定检索结果

文献类型

  • 200 篇 期刊文献
  • 39 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 230 篇 工学
    • 109 篇 计算机科学与技术...
    • 105 篇 网络空间安全
    • 51 篇 软件工程
    • 46 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 15 篇 信息与通信工程
    • 14 篇 仪器科学与技术
    • 6 篇 机械工程
    • 3 篇 电气工程
    • 2 篇 交通运输工程
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
    • 1 篇 测绘科学与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 55 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 6 篇 艺术学
    • 6 篇 设计学(可授艺术学...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 系统科学
    • 1 篇 地球物理学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 240 篇 intrusion detect...
  • 30 篇 deep learning
  • 30 篇 network security
  • 27 篇 machine learning
  • 18 篇 anomaly detectio...
  • 18 篇 data mining
  • 17 篇 security
  • 15 篇 feature selectio...
  • 12 篇 cybersecurity
  • 11 篇 internet of thin...
  • 9 篇 support vector m...
  • 7 篇 iot
  • 7 篇 cloud computing
  • 6 篇 clustering
  • 5 篇 cnn
  • 5 篇 blockchain
  • 4 篇 autoencoder
  • 4 篇 particle swarm o...
  • 4 篇 feature extracti...
  • 4 篇 neural network

机构

  • 7 篇 department of co...
  • 3 篇 department of in...
  • 3 篇 information tech...
  • 3 篇 department of el...
  • 3 篇 department of in...
  • 3 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 ieee
  • 2 篇 inst. of computi...
  • 2 篇 key laboratory o...
  • 2 篇 department of co...
  • 2 篇 gongqing college...
  • 2 篇 cyberspace insti...
  • 2 篇 school of softwa...
  • 2 篇 department of co...
  • 2 篇 武汉大学
  • 2 篇 jiangsu collabor...
  • 2 篇 school of intern...

作者

  • 5 篇 abdelwahed motwa...
  • 4 篇 yi ping
  • 4 篇 ishfaq yaseen
  • 4 篇 manar ahmed hamz...
  • 3 篇 wu yue
  • 3 篇 mesfer al duhayy...
  • 3 篇 mahmoud ragab
  • 3 篇 heba g.mohamed
  • 2 篇 abu sarwar zaman...
  • 2 篇 radwa marzouk
  • 2 篇 el-sayed m.el-ke...
  • 2 篇 mohammed rizwanu...
  • 2 篇 abdelaziz a.abde...
  • 2 篇 wang hui
  • 2 篇 tian xinguang
  • 2 篇 anwer mustafa hi...
  • 2 篇 gyanendra prasad...
  • 2 篇 董晓梅
  • 2 篇 mrim m.alnfiai
  • 2 篇 张凤斌

语言

  • 214 篇 英文
  • 26 篇 中文
检索条件"主题词=intrusion detection"
240 条 记 录,以下是11-20 订阅
排序:
intrusion detection BASED ON THE SECOND-ORDER STOCHASTIC MODEL
收藏 引用
Journal of Electronics(China) 2007年 第5期24卷 679-685页
作者: Zhang Xiaoqiang Zhu Zhongliang Fan Pingzhi School of Logistics Southwest Jiaotong University Chengdu 610031 China
This paper presents a new method based on a second-order stochastic model for computer intrusion *** results show that the performance of the second-order stochastic model is better than that of a first-order stochast... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SVM-DT-Based Adaptive and Collaborative intrusion detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2018年 第1期5卷 108-118页
作者: Shaohua Teng Naiqi Wu Haibin Zhu Luyao Teng Wei Zhang School of Computer Science and Technology Guangdong University of Technology Guangzhou 510006 China Institute of Systems Engineering Macao University of Science and Technology Macao 999078 China school of Electro-Mechanical Engineering Guangdong University of Technology Guangzhou 510006 China Collaborative Systems Laboratory Nipissing University North Bay Ontario PICILZ Canada College of Engineering and Science Victoria University Ballarat Rd Footscray VIC 3011 Australia IEEE
As a primary defense technique, intrusion detection becomes more and more significant since the security of the networks is one of the most critical issues in the world. We present an adaptive collaboration intrusion ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Distributed intrusion detection for mobile ad hoc networks
收藏 引用
Journal of Systems Engineering and Electronics 2008年 第4期19卷 851-859页
作者: Yi Ping Jiang Xinghao Wu Yue Liu Ning School of Information Security Engineering Shanghai Jiaotong Univ Shanghai 200030 P. R. China State Key Lab of Information Security Graduate School of Chinese Academy of Sciences Beijing 100039 P. R. China
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An intrusion detection Method for Advanced Metering Infrastructure System Based on Federated Learning
收藏 引用
Journal of Modern Power Systems and Clean Energy 2023年 第3期11卷 927-937页
作者: Haolan Liang Dongqi Liu Xiangjun Zeng Chunxiao Ye School of Electrical and Information Engineering Changsha University of Science and TechnologyChangsha 410114China Hunan Institute of Engineering Xiangtan 411104China
An advanced metering infrastructure(AMI)system plays a key role in the smart grid(SG),but it is vulnerable to *** detection methods for AMI cyberattacks mainly focus on the data center or a distributed independent ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 111-124页
作者: Haifeng Lin Qilin Xue Jiayin Feng Di Bai Nanjing Forestry University China Nanjing Agricultural University China Hebei Normal University of Science and Technology China
With the rapid development of the Internet of Things(IoT),there are several challenges pertaining to security in IoT *** with the characteristics of the traditional Internet,the IoT has many problems,such as large ass... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fooling intrusion detection systems using adversarially autoencoder
收藏 引用
Digital Communications and Networks 2021年 第3期7卷 453-460页
作者: Junjun Chen Di Wu Ying Zhao Nabin Sharma Michael Blumenstein Shui Yu College of Information Science and Technology Beijing University of Chemical TechnologyBeijing100029China School of Computer Science University of Technology SydneyUltimo2007Australia Centre for Artificial Intelligence University of Technology SydneyUltimo2007Australia
Due to the increasing cyber-attacks,various intrusion detection Systems(IDSs)have been proposed to identify network *** existing machine learning-based IDSs learn patterns from the features extracted from network traf... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
intrusion detection Method for Program Vulnerability via Library Calls
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 126-130页
作者: DUAN Xuetao ZHONG Anming LI Ying JIA Chunfu College of Information Technology and Science Nankai University Tianjin 300071 China College of Information Science and Technology University of Science and Technology of China Hefei 230026Anhui China
Library function call sequence is the direct reflection of a program's behavior. The relationship between program vulnerability and library calls is analyzed, and an intrusion detection method via library calls is pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel Eccentric intrusion detection Model Based on Recurrent Neural Networks with Leveraging LSTM
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3089-3127页
作者: Navaneetha Krishnan Muthunambu Senthil Prabakaran Balasubramanian Prabhu Kavin Kishore Senthil Siruvangur Kavitha Chinnadurai Jehad Ali Department of Computer Applications Karpagam College of EngineeringCoimbatore641032India Department of Computer Science and Engineering Karpagam College of EngineeringCoimbatore641032India Department of Data Science and Business Systems College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyJeppiaar NagarRajiv Gandhi SalaiChennai600119India Department of AI Convergence Network Ajou UniversitySuwon16499Korea
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Online intrusion detection Mechanism Based on Model Migration in Intelligent Pumped Storage Power Stations
收藏 引用
China Communications 2023年 第4期20卷 368-381页
作者: Yue Zong Yuanlin Luo Yuechao Wu Jiande Huang Bowen Yang Xiaoyu Kang Shumei Liu Yao Yu Power China Huadong Engineering Corporation Limited Hangzhou 311122China East China Tongbai Pumped Storage Power Generation Co. LtdTaizhou 317200China School of Computer Science and Engineering Northeastern UniversityShenyang 110169China
With the continuous integration of new energy into the power grid,various new attacks continue to emerge and the feature distributions are constantly changing during the deployment of intelligent pumped storage power ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A new data normalization method for unsupervised anomaly intrusion detection
收藏 引用
Journal of Zhejiang University-Science C(Computers and Electronics) 2010年 第10期11卷 778-784页
作者: Long-zheng CAI Jian CHEN Yun KE Yao CHEN Zhi-gang LI Engineering and Commerce College South-Central University for Nationalities Wuhan 430065 China Guangdong Institute of Science and Technology Zhuhai 519090 China
Unsupervised anomaly detection can detect attacks without the need for clean or labeled training *** paper studies the application of clustering to unsupervised anomaly detection(ACUAD).Data records are mapped to a fe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论