CSpace

浏览/检索结果: 共8条,第1-8条 帮助

已选(0)清除 条数/页:   排序方式:
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder-decoder architecture 期刊论文
COMPUTERS & SECURITY, 2024, 卷号: 146, 页码: 15
作者:  Zha, Chao;  Wang, Zhiyu;  Fan, Yifei;  Zhang, Xingming;  Bai, Bing;  Zhang, Yinjie;  Shi, Sainan;  Zhang, Ruyun
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Intrusion detection  Sigmoid Kernel Transformation  Pre-trained encoder  Encoder-decoder  Cosine similarity  
Context aware intrusion detection for building automation systems 期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:  Pan, Zhiwen;  Hariri, Salim;  Pacheco, Jesus
收藏  |  浏览/下载:85/0  |  提交时间:2019/12/10
Internet of Things  Network security  Context awareness  Supervised learning  Data mining  Intrusion detection  
Network intrusion detection based on system calls and data mining 期刊论文
FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 卷号: 4, 期号: 4, 页码: 522-528
作者:  Tian, Xinguang;  Cheng, Xueqi;  Duan, Miyi;  Liao, Rui;  Chen, Hong;  Chen, Xiaojuan
收藏  |  浏览/下载:46/0  |  提交时间:2019/12/16
intrusion detection  data mining  system call  anomaly detection  
Accelerating the bit-split string matching algorithm using Bloom filters 期刊论文
COMPUTER COMMUNICATIONS, 2010, 卷号: 33, 期号: 15, 页码: 1785-1794
作者:  Huang, Kun;  Zhang, Dafang;  Qin, Zheng
收藏  |  浏览/下载:43/0  |  提交时间:2019/12/16
Intrusion detection  String matching  Bloom filter  Bit-split  Byte filter  
Detecting network intrusions by data mining and variable-length sequence pattern matching 期刊论文
JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 卷号: 20, 期号: 2, 页码: 405-411
作者:  Tian Xinguang;  Duan Miyi;  Sun Chunlai;  Liu Xin
收藏  |  浏览/下载:44/0  |  提交时间:2019/12/16
intrusion detection  anomaly detection  system call  data mining  variable-length pattern  
Intrusion detection based on system calls and homogeneous Markov chains 期刊论文
JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 卷号: 19, 期号: 3, 页码: 598-605
作者:  Tian Xinguang;  Duan Miyi;  Sun Chunlai;  Li Wenfa
收藏  |  浏览/下载:42/0  |  提交时间:2019/12/16
intrusion detection  Markov chain  anomaly detection  system call  
Anomaly detection of user behavior based on shell commands and homogeneous Markov chains 期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2008, 卷号: 17, 期号: 2, 页码: 231-236
作者:  Xinguang, Tian;  Miyi, Duan;  Wenfa, Li;  Chunlai, Sun
收藏  |  浏览/下载:180/0  |  提交时间:2019/12/16
intrusion detection  anomaly detection  shell command  Markov chain  
An active learning based TCM-KNN algorithm for supervised network intrusion detection 期刊论文
COMPUTERS & SECURITY, 2007, 卷号: 26, 期号: 7-8, 页码: 459-467
作者:  Li, Yang;  Guo, Li
收藏  |  浏览/下载:44/0  |  提交时间:2019/12/16
network security  intrusion detection  TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors)  algorithm  machine learning  active learning