咨询与建议

限定检索结果

文献类型

  • 136 篇 期刊文献
  • 10 篇 会议

馆藏范围

  • 146 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 144 篇 工学
    • 107 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 41 篇 网络空间安全
    • 39 篇 控制科学与工程
    • 34 篇 电子科学与技术(可...
    • 31 篇 电气工程
    • 29 篇 信息与通信工程
    • 24 篇 机械工程
    • 21 篇 材料科学与工程(可...
    • 12 篇 仪器科学与技术
    • 10 篇 生物医学工程(可授...
    • 8 篇 力学(可授工学、理...
    • 6 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 52 篇 理学
    • 34 篇 数学
    • 15 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 3 篇 系统科学
    • 2 篇 化学
    • 2 篇 天文学
  • 32 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 7 篇 法学
    • 5 篇 社会学
    • 3 篇 法学
  • 6 篇 医学
    • 6 篇 临床医学
  • 5 篇 教育学
    • 4 篇 心理学(可授教育学...
    • 2 篇 教育学
  • 4 篇 农学
    • 4 篇 作物学
  • 1 篇 经济学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 18 篇 deep learning
  • 9 篇 object detection
  • 9 篇 machine learning
  • 8 篇 anomaly detectio...
  • 7 篇 intrusion detect...
  • 6 篇 convolutional ne...
  • 6 篇 security
  • 6 篇 network security
  • 5 篇 intrusion detect...
  • 4 篇 feature extracti...
  • 4 篇 cyber security
  • 3 篇 internet of thin...
  • 3 篇 support vector m...
  • 3 篇 network
  • 3 篇 blockchain
  • 3 篇 detection
  • 3 篇 privacy protecti...
  • 3 篇 neural network
  • 3 篇 data fusion
  • 3 篇 computer vision

机构

  • 4 篇 china informatio...
  • 3 篇 department of fu...
  • 3 篇 department of el...
  • 2 篇 engineering rese...
  • 2 篇 institute of inf...
  • 2 篇 ministry of educ...
  • 2 篇 department of co...
  • 2 篇 school of cybers...
  • 2 篇 ieee
  • 2 篇 security enginee...
  • 2 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 state key lab of...
  • 2 篇 school of cyber ...
  • 2 篇 department of co...
  • 2 篇 national compute...
  • 2 篇 department of co...
  • 2 篇 college of compu...
  • 2 篇 state key labora...
  • 1 篇 china mobile inf...

作者

  • 4 篇 il-gu lee
  • 3 篇 xiaohong guan
  • 3 篇 walid el-shafai
  • 3 篇 jiang wu
  • 3 篇 hwankuk kim
  • 2 篇 yong peng
  • 2 篇 jiho shin
  • 2 篇 feng xie
  • 2 篇 meng li
  • 2 篇 omar almomani
  • 2 篇 tianming liu
  • 2 篇 jiqiang liu
  • 2 篇 qixu liu
  • 2 篇 muhammad waqas
  • 2 篇 shanshan tu
  • 2 篇 so-eun jeon
  • 2 篇 ye-eun kim
  • 2 篇 xiaolong xu
  • 2 篇 haizhen wang
  • 2 篇 jung taek seo

语言

  • 145 篇 英文
  • 1 篇 中文
检索条件"机构=Intelligent Network Security Detection and Evaluation Laboratory"
146 条 记 录,以下是1-10 订阅
排序:
Artificial Immune detection for network Intrusion Data Based on Quantitative Matching Method
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2361-2389页
作者: CaiMing Liu Yan Zhang Zhihui Hu Chunming Xie School of Electronic Information and Artificial Intelligence Leshan Normal UniversityLeshan614000China intelligent network security detection and evaluation laboratory Leshan Normal UniversityLeshan614000China Internet Natural Language intelligent Processing Key laboratory of Education Department of Sichuan Province Leshan Normal UniversityLeshan614000China
Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection *** paper proposes an artificial immune detection m... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key laboratory of Big Data network security detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Recommendation System Based on Perceptron and Graph Convolution network
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3939-3954页
作者: Zuozheng Lian Yongchao Yin Haizhen Wang College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key laboratory of Big Data network security detection and Analysis Qiqihar UniversityQiqihar161006China
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
E2E-MFERC:AMulti-Face Expression Recognition Model for Group Emotion Assessment
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1105-1135页
作者: Lin Wang Juan Zhao Hu Song Xiaolong Xu Jiangsu Key laboratory of Big Data security&intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210042China School of network security Jinling Institute of TechnologyNanjing211169China State Grid Jiangsu Electric Power Company Limited Nanjing210000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210042China
In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assessstudents’ group emotions can provide educators with more comprehensive and intuitive classroom effect anal... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber security Fujian Normal UniversityFuzhouChina Key laboratory of network Computing and intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DCEL:classifier fusion model for Android malware detection
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 163-177页
作者: XU Xiaolong JIANG Shuai ZHAO Jinbo WANG Xinheng Jiangsu Key laboratory of Big Data security&intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computing and Engineering University of West LondonLondon W55RFUK
The rapid growth of mobile applications,the popularity of the Android system and its openness have attracted many hackers and even criminals,who are creating lots of Android ***,the current methods of Android malware ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
High-Level security Dimension evaluation of Blockchain BaaS System and Key Technology
收藏 引用
China Communications 2024年 第6期21卷 176-191页
作者: Chen Wanfa Zheng Qing’an Chen Shuzhen Fu Hongyi Chen Liang Fujian Police College Fuzhou 350007China Computer Science and Information security Management Department Fujian Police CollegeFuzhou 350007China Fujian Province Key laboratory for Digital network Crime Supervision and Prevention Fuzhou 350007China Beijing University of Posts and Telecommunications Beijing 100876China Fujian Provincial Prison Administration Fuzhou 350002China
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial *** blockchain technology and applications are developi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Anomaly detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 585-607页
作者: Min-Gyu Kim Hwankuk Kim Department of Financial Information security Kookmin UniversitySeoul02707Republic of Korea Department of Information security Cryptography Mathematics Kookmin UniversitySeoul02707Republic of Korea
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private network),and Tor has led to a rise in attacks leveraging encrypted *** research on anomaly detection u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Study on Influential User Identification in Online Social networks
收藏 引用
Chinese Journal of Electronics 2016年 第3期25卷 467-473页
作者: WANG Nan SUN Qindong ZHOU Yadong SHEN Si Shaanxi Key laboratory of network Computing and security Xi'an University of Technology Ministry of Education Key laboratory For intelligent network and network security Xi'an Jiaotong University
Influential user evaluation is great importance in many application areas of online social *** order to identify influential users in a more adequate and practical way, we propose a Dynamic regional interaction model(... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Detecting compromised email accounts via login behavior characterization
收藏 引用
Cybersecurity 2024年 第1期7卷 16-36页
作者: Jianjun Zhao Can Yang Di Wu Yaqin Cao Yuling Liu Xiang Cui Qixu Liu Institute of Information Engineering Chinese Academy of SciencesBeijing100085China School of Cyber security University of Chinese Academy of SciencesBeijing100049China China Cybersecurity Review Technology and Certification Center Beijing100013China Zhongguancun laboratory Beijing100089China
The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and *** compromised email accounts is more challenging than in the social network field,where email accounts ha... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论