中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
自动化研究所 [4]
计算技术研究所 [2]
沈阳自动化研究所 [2]
软件研究所 [2]
长春光学精密机械与物... [1]
中国科学院大学 [1]
更多
采集方式
OAI收割 [11]
iSwitch采集 [1]
内容类型
期刊论文 [7]
会议论文 [4]
学位论文 [1]
发表日期
2021 [2]
2020 [1]
2019 [1]
2016 [1]
2012 [1]
2010 [1]
更多
学科主题
筛选
浏览/检索结果:
共12条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G
期刊论文
OAI收割
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:
Zhang, Zhixia
;
Cao, Yang
;
Cui, Zhihua
;
Zhang, Wensheng
;
Chen, Jinjun
  |  
收藏
  |  
浏览/下载:55/0
  |  
提交时间:2021/08/15
Intrusion detection
Security
6G mobile communication
Data models
Protocols
Optimization
Encryption
Controller area network (CAN)
intrusion detection
machine learning (ML)
many-objective optimization
vehicular networks security
Research on Intrusion Detection Based on BP Neural Network
会议论文
OAI收割
Virtual, Guangzhou, China, January 15-17, 2021
作者:
Chen, Haonan
;
Liu YY(刘意杨)
;
Zhao JM(赵剑明)
;
Liu XD(刘贤达)
  |  
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2021/03/14
BP neural network
intrusion detection
back propagation
A Real-Time and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support Vector Machine
期刊论文
OAI收割
IEEE/CAA Journal of Automatica Sinica, 2020, 卷号: 7, 期号: 3, 页码: 790-799
作者:
Hao Zhang
;
Yongdan Li
;
Zhihan Lv
  |  
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/03/11
Deep belief network (DBN)
flow calculation
frequent pattern
intrusion detection
sliding window
support vector machine (SVM)
Context aware intrusion detection for building automation systems
期刊论文
OAI收割
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:
Pan, Zhiwen
;
Hariri, Salim
;
Pacheco, Jesus
  |  
收藏
  |  
浏览/下载:72/0
  |  
提交时间:2019/12/10
Internet of Things
Network security
Context awareness
Supervised learning
Data mining
Intrusion detection
Modbus communication behavior modeling and SVM intrusion detection method
会议论文
OAI收割
2016 6th International Conference on Communication and Network Security, ICCNS 2016, Singapore, Singapore, November 12-14, 2016
作者:
Shang WL(尚文利)
;
Cui JR(崔君荣)
;
Wan M(万明)
;
An PF(安攀峰)
;
Zeng P(曾鹏)
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2017/03/25
Industrial control network
intrusion detection
Modbus/TCP
feature extraction
SVM
An approach to the misleading action solving in plan recognition (EI CONFERENCE)
会议论文
OAI收割
2012 International Conference on Machine Learning and Cybernetics, ICMLC 2012, July 15, 2012 - July 17, 2012, Xian, Shaanxi, China
作者:
Wang Y.
;
Wang Y.
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2013/03/25
Misleading actions have not been considered in previous researches on plan recognition. It leads to poor recognition results for some special domains. This paper introduces new concepts including reliability
correlativity
and correlated action sequence etc. A novel algorithm is proposed to recognize a misleading action by using correlated action sequences. The proposed algorithm is shown to improve the accuracy of plan recognition. Moreover
it could also be applied to intrusion detection and network security problems. 2012 IEEE.
Multiple criteria optimization-based data mining methods and applications: a systematic survey
期刊论文
iSwitch采集
Knowledge and information systems, 2010, 卷号: 24, 期号: 3, 页码: 369-391
作者:
Shi, Yong
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2019/05/10
Data mining
Classification
Multi-criteria programming
Fuzzy programming
Regression
Credit scoring
Bioinformatics
Network intrusion detection
Bankruptcy prediction
Unsupervised Active Learning Based on Hierarchical Graph-Theoretic Clustering
期刊论文
OAI收割
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2009, 卷号: 39, 期号: 5, 页码: 1147-1161
作者:
Hu, Weiming
;
Hu, Wei
;
Xie, Nianhua
;
Maybank, Steve
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2015/08/12
Active learning
dominant-set clustering
image and video classification
network intrusion detection
spectral clustering
an access-context based method to detect network scanning event in lan
会议论文
OAI收割
International Conference on Machine Learning and Cybernetics, Baoding, PEOPLES R CHINA, JUL 12-15,
Wu Di
;
Yin Ying
;
Chen Xiao-Hua
;
Bu Ning
  |  
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2011/03/20
Network security
network monitoring
network scanning
intrusion detection
An active learning based TCM-KNN algorithm for supervised network intrusion detection
期刊论文
OAI收割
COMPUTERS & SECURITY, 2007, 卷号: 26, 期号: 7-8, 页码: 459-467
作者:
Li, Yang
;
Guo, Li
  |  
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2019/12/16
network security
intrusion detection
TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors)
algorithm
machine learning
active learning