咨询与建议

限定检索结果

文献类型

  • 200 篇 期刊文献
  • 39 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 230 篇 工学
    • 111 篇 计算机科学与技术...
    • 104 篇 网络空间安全
    • 51 篇 软件工程
    • 45 篇 控制科学与工程
    • 23 篇 电子科学与技术(可...
    • 14 篇 信息与通信工程
    • 13 篇 仪器科学与技术
    • 6 篇 机械工程
    • 3 篇 电气工程
    • 2 篇 交通运输工程
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
    • 1 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 54 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 系统科学
    • 1 篇 地球物理学
  • 5 篇 艺术学
    • 5 篇 设计学(可授艺术学...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 240 篇 intrusion detect...
  • 30 篇 deep learning
  • 30 篇 network security
  • 27 篇 machine learning
  • 18 篇 anomaly detectio...
  • 18 篇 data mining
  • 17 篇 security
  • 15 篇 feature selectio...
  • 12 篇 cybersecurity
  • 11 篇 internet of thin...
  • 9 篇 support vector m...
  • 7 篇 iot
  • 7 篇 cloud computing
  • 6 篇 clustering
  • 5 篇 cnn
  • 5 篇 blockchain
  • 4 篇 autoencoder
  • 4 篇 particle swarm o...
  • 4 篇 feature extracti...
  • 4 篇 neural network

机构

  • 7 篇 department of co...
  • 3 篇 department of in...
  • 3 篇 information tech...
  • 3 篇 department of el...
  • 3 篇 department of in...
  • 3 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 ieee
  • 2 篇 inst. of computi...
  • 2 篇 key laboratory o...
  • 2 篇 department of co...
  • 2 篇 gongqing college...
  • 2 篇 cyberspace insti...
  • 2 篇 school of softwa...
  • 2 篇 department of co...
  • 2 篇 武汉大学
  • 2 篇 jiangsu collabor...
  • 2 篇 school of intern...

作者

  • 5 篇 abdelwahed motwa...
  • 4 篇 yi ping
  • 4 篇 ishfaq yaseen
  • 4 篇 manar ahmed hamz...
  • 3 篇 wu yue
  • 3 篇 mesfer al duhayy...
  • 3 篇 mahmoud ragab
  • 3 篇 heba g.mohamed
  • 2 篇 abu sarwar zaman...
  • 2 篇 radwa marzouk
  • 2 篇 el-sayed m.el-ke...
  • 2 篇 mohammed rizwanu...
  • 2 篇 abdelaziz a.abde...
  • 2 篇 wang hui
  • 2 篇 tian xinguang
  • 2 篇 anwer mustafa hi...
  • 2 篇 gyanendra prasad...
  • 2 篇 董晓梅
  • 2 篇 mrim m.alnfiai
  • 2 篇 张凤斌

语言

  • 214 篇 英文
  • 26 篇 中文
检索条件"主题词=intrusion detection"
240 条 记 录,以下是1-10 订阅
排序:
intrusion detection based on system calls and homogeneous Markov chains
收藏 引用
Journal of Systems Engineering and Electronics 2008年 第3期19卷 598-605页
作者: Tian Xinguang Duan Miyi Sun Chunlai Li Wenfa Inst. of Computing Technology Beijing Jiaotong Univ. Beijing 100029 P. R. China Inst. of Computing Technology Chinese Academy of Sciences Beijing 100080 P. R. China
A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
intrusion detection Methods Based on Incomplete RFID Traces
收藏 引用
Chinese Journal of Electronics 2017年 第4期26卷 675-680页
作者: LI Peng WANG Zhen XU He ZHU Feng WANG Ruchuan School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
According to the Radio frequency identification(RFID) tag cloning attack problems of RFID system and the existing problems of intrusion detection research based on incomplete RFID traces, this paper proposes a method ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
intrusion detection using rough set classification
收藏 引用
Journal of Zhejiang University Science 2004年 第9期5卷 1076-1086页
作者: 张连华 张冠华 郁郎 张洁 白英彩 DepartmentofComputerScienceandEngineering ShanghaiJlaotongUmversityShanghai200030China *** DepartmentofComputing HongKongPolytechnicUniversityHongKongChina DepartmentofComputerScienceandEngineering ShanghaiJiaotongUniversityShanghai200030China
Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learn... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
intrusion detection System for Big Data Analytics in IoT Environment
收藏 引用
Computer Systems Science & Engineering 2022年 第10期43卷 381-396页
作者: M.Anuradha G.Mani T.Shanthi N.R.Nagarajan P.Suresh C.Bharatiraja Department of Computer Science and Engineering St.Joseph’s College of EngineeringChennai600119India Department of Computer Science and Engineering University College of Engineering ArniThatchur632326India Department of Electronics&Communication Engineering Kings College of EngineeringPudukkottai613303India Department of Electronics&Communication Engineering K.Ramakrishnan College of EngineeringTiruchirapalli621112India Department of Computer Science and Engineering KPR Institute of Engineering and TechnologyCoimbatore641407India Department of Electrical and Electronics Engineering SRM Institute of Science and TechnologyChennai603203India
In the digital area,Internet of Things(IoT)and connected objects generate a huge quantity of data traffic which feeds big data analytic models to discover hidden patterns and detect abnormal *** IoT networks are popul... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
intrusion detection System Using FKNN and Improved PSO
收藏 引用
Computers, Materials & Continua 2021年 第5期67卷 1429-1445页
作者: Raniyah Wazirali College of Computing and Informatics Saudi Electronic UniversitySaudi ArabiaRiyadh
intrusion detection system(IDS)techniques are used in cybersecurity to protect and safeguard sensitive *** increasing network security risks can be mitigated by implementing effective IDS methods as a defense *** prop... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
intrusion detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
收藏 引用
Computers, Materials & Continua 2023年 第1期74卷 801-815页
作者: Yongjie Yang Shanshan Tu Raja Hashim Ali Hisham Alasmary Muhammad Waqas Muhammad Nouman Amjad Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Information Security and Cybersecurity Unit King Khalid UniversityAbhaSaudi Arabia Computer Engineering Department College of Information TechnologyUniversity of Bahrain32038Bahrain School of Engineering Edith Cowan UniversityJoondalup PerthWA6027Australia School of Engineering University of Management and TechnologyLahorePakistan
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
intrusion detection for Wireless Mesh Networks using Finite State Machine
收藏 引用
China Communications 2010年 第5期7卷 40-48页
作者: Yi Ping Wu Yue Liu Ning Wang Zhiyang School of Information Security Engineering Shanghai Jiao Tong University Shanghai 200240 P. R. China Key Laboratory of Child Development and Learning Science of Ministry of Education Southeast University Nanjing 210096 China
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
intrusion detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2279-2290页
作者: Mohammad S.Al-kahtani Zahid Mehmood Tariq Sadad Islam Zada Gauhar Ali Mohammed ElAffendi Department of Computer Engineering Prince Sattam Bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia Department of Computer Engineering University of Engineering and TechnologyTaxila47050Pakistan The FAMLIR Group The University of LahoreLahore54000Pakistan Department of Computer Science University of Engineering&TechnologyMardan23200Pakistan Faculty of Computing International Islamic UniversityIslamabad44000Pakistan EIAS Data Science and Blockchain Lab College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Cybersecurity threats are increasing rapidly as hackers use advanced *** a result,cybersecurity has now a significant factor in protecting organizational *** detection systems(IDSs)are used in networks to flag serious... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
intrusion detection Approach Using Connectionist Expert System
收藏 引用
Journal of Beijing Institute of Technology 2005年 第4期14卷 467-470页
作者: 马锐 刘玉树 杜彦辉 School of Software Beijing Institute of Technology Beijing100081 China Department of Information Security Science Chinese People's Public Security University Beijing100038 China
In order to improve the detection efficiency of rule-based expert systems, an intrusion detection approach using connectionist expert system is proposed. The approach converts the AND/OR nodes into the corresponding n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
intrusion detection Method Based on Improved Growing Hierarchical Self-Organizing Map
收藏 引用
Transactions of Tianjin University 2016年 第4期22卷 334-338页
作者: 张亚平 布文秀 苏畅 王璐瑶 许涵 School of Software Tianjin University School of Mathematical Science Nankai University
Considering that growing hierarchical self-organizing map(GHSOM) ignores the influence of individual component in sample vector analysis, and its accurate rate in detecting unknown network attacks is relatively lower,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论