咨询与建议

限定检索结果

文献类型

  • 145 篇 期刊文献
  • 41 篇 会议

馆藏范围

  • 186 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 104 篇 网络空间安全
    • 103 篇 计算机科学与技术...
    • 47 篇 信息与通信工程
    • 46 篇 电气工程
    • 38 篇 电子科学与技术(可...
    • 22 篇 材料科学与工程(可...
    • 18 篇 控制科学与工程
    • 15 篇 仪器科学与技术
    • 10 篇 生物医学工程(可授...
    • 9 篇 力学(可授工学、理...
    • 9 篇 机械工程
    • 6 篇 软件工程
    • 2 篇 动力工程及工程热...
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 29 篇 理学
    • 22 篇 数学
    • 3 篇 物理学
    • 3 篇 生物学
    • 3 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 11 篇 管理学
    • 7 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 4 篇 法学
    • 4 篇 法学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 186 篇 network security
  • 21 篇 intrusion detect...
  • 9 篇 intrusion detect...
  • 9 篇 machine learning
  • 7 篇 firewall
  • 5 篇 privacy
  • 5 篇 anomaly detectio...
  • 4 篇 internet of thin...
  • 4 篇 situation predic...
  • 4 篇 data mining
  • 4 篇 cybersecurity
  • 4 篇 information secu...
  • 4 篇 neural network
  • 4 篇 cloud computing
  • 3 篇 botnet detection
  • 3 篇 deep learning
  • 3 篇 ddos attack
  • 3 篇 information tech...
  • 3 篇 internet
  • 3 篇 malicious code

机构

  • 2 篇 school of inform...
  • 2 篇 institute of net...
  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 2 篇 industry and inf...
  • 2 篇 school of inform...
  • 2 篇 department of el...
  • 2 篇 department of co...
  • 2 篇 mobile network s...
  • 2 篇 college of compu...
  • 2 篇 hutchinson commu...
  • 1 篇 digital security...
  • 1 篇 beijing key labo...
  • 1 篇 college of busin...
  • 1 篇 department of pa...
  • 1 篇 department of co...
  • 1 篇 chongqing key la...
  • 1 篇 school of applie...
  • 1 篇 the ohio state u...
  • 1 篇 ibec university ...

作者

  • 3 篇 yang geng
  • 2 篇 jie xu
  • 2 篇 moon sangjae
  • 2 篇 fatma s.alrayes
  • 2 篇 olatunde abiona
  • 2 篇 omar h. alhazmi
  • 2 篇 yichiet aun
  • 2 篇 何德明
  • 2 篇 cheng hong-bing
  • 2 篇 khalid s. aloufi
  • 2 篇 rodney alexander
  • 2 篇 vasaki ponnusamy
  • 2 篇 li jianhua
  • 2 篇 hui xu
  • 1 篇 qixiao lin
  • 1 篇 高庆狮
  • 1 篇 jian wang
  • 1 篇 yang yi-xian niu...
  • 1 篇 noor ahmed shaik...
  • 1 篇 谢辉

语言

  • 143 篇 英文
  • 43 篇 中文
检索条件"主题词=network security"
186 条 记 录,以下是1-10 订阅
排序:
network security Situation Prediction Based on TCAN-BiGRU Optimized by SSA and IQPSO
收藏 引用
Computer Systems Science & Engineering 2023年 第10期47卷 993-1021页
作者: Junfeng Sun Chenghai Li Yafei Song Peng Ni Jian Wang College of Air and Missile Defence Air Force Engineering UniversityXi’an710051China Science and Technology on Complex Aviation Systems Simulation Laboratory Beijing100076China
The accuracy of historical situation values is required for traditional network security situation prediction(NSSP).There are discrepancies in the correlation and weighting of the various network security elements.To ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Use of subword tokenization for domain generation algorithm classification
收藏 引用
Cybersecurity 2024年 第2期7卷 1-12页
作者: Sea Ran Cleon Liew Ngai Fong Law University of Waterloo WaterlooCanada Department of Electrical and Electronic Engineering The Hong Kong Polytechnic UniversityKowloonHong Kong
Domain name generation algorithm(DGA)classification is an essential but challenging problem.Both feature-extract-ing machine learning(ML)methods and deep learning(DL)models such as convolutional neural networks and lo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
AWeb Application Fingerprint Recognition Method Based on Machine Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第7期140卷 887-906页
作者: Yanmei Shi Wei Yu Yanxia Zhao Yungang Jia School of Integrated Circuit Science and Engineering Tianjin University of TechnologyTianjin300382China College of International Business Zhejiang Yuexiu UniversityShaoxing312030China School of Public Administration Zhejiang Gongshang UniversityHangzhou310018China Tianjin Branch of National Computer network Emergency Response Technical Team/Coordination Center of China Tianjin300100China
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 4049-4069页
作者: Bing Liu Zhe Zhang Shengrong Hu Song Sun Dapeng Liu Zhenyu Qiu Zhejiang Institute of Industry and Information Technology Hangzhou310000China Digital Economy Development Center of Zhejiang Hangzhou310000China College of Computer and Information Science Chongqing Normal UniversityChongqing401331China Bank of Suzhou Suzhou215000China Hangzhou Hikvision Digital Technology Co. Ltd.Hangzhou310051China
Internet of Things(IoT)is vulnerable to data-tampering(DT)attacks.Due to resource limitations,many anomaly detection systems(ADSs)for IoT have high false positive rates when detecting DT attacks.This leads to the misr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Applying an Improved Dung Beetle Optimizer Algorithm to network Traffic Identification
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 4091-4107页
作者: Qinyue Wu Hui Xu Mengran Liu School of Computer Science Hubei University of TechnologyWuhan430068China
network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Correlation Composition Awareness Model with Pair Collaborative Localization for IoT Authentication and Localization
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 943-961页
作者: Kranthi Alluri S.Gopikrishnan School of Computer Science and Engineering VIT-AP UniversityAmaravathiAndhra Pradesh522241India
Secure authentication and accurate localization among Internet of Things(IoT)sensors are pivotal for the functionality and integrity of IoT networks.IoT authentication and localization are intricate and symbiotic,impa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
WNN-Based network security Situation Quantitative Prediction Method and Its Optimization
收藏 引用
Journal of Computer Science & Technology 2008年 第2期23卷 222-230页
作者: 赖积保 王慧强 刘效武 梁颖 郑瑞娟 赵国生 College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China
The accurate and real-time prediction of network security situation is the premise and basis of preventing intrusions and attacks in a large-scale network. In order to predict the security situation more accurately, a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
network security Situation Evaluation Based on Modified D-S Evidence Theory
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第5期19卷 409-416页
作者: WANG Chundong ZHANG YuKey Laboratory of Computer Vision and System Ministry of Education/Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology
With the rapid development of global information and the increasing dependence on network for people, network security problems are becoming more and more serious. By analyzing the existing security assessment methods... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research on Key Technologies of network security Situational Awareness for Attack Tracking Prediction
收藏 引用
Chinese Journal of Electronics 2019年 第1期28卷 162-171页
作者: KOU Guang WANG Shuo TANG Guangming Artificial Intelligence Research Center National Innovation Institute of Defense Technology Information Engineering University
This paper analyzed the existing network security situation evaluation methods and discovered that they cannot accurately reflect the features of large-scale,synergetic, multi-stage gradually shown by network attack b... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Application of mobile scanning agent in the network security
收藏 引用
Journal of Systems Engineering and Electronics 2004年 第3期15卷 371-376页
作者: 闵君 冯珊 唐超 梅纲 DepartmentofAutomaticControlEngineering InstituteofSystemsEngineeringHuazhongUniversityofScienceandTechnologyWuhan430074P.R.China
To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论