×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [12]
兰州理工大学 [10]
厦门大学 [8]
自动化研究所 [8]
华南理工大学 [6]
西安交通大学 [4]
更多...
内容类型
期刊论文 [38]
会议论文 [25]
其他 [6]
学位论文 [6]
发表日期
2022 [1]
2021 [2]
2020 [2]
2019 [2]
2018 [5]
2017 [6]
更多...
学科主题
computer s... [1]
radio syst... [1]
计算机应用 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共75条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models
期刊论文
EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022
作者:
Akhtar, Muhammad Shoaib
;
Feng, Tao
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/03/01
cyberattack
machine learning
ensemble learning
Sample-based online learning for bi-regular hinge loss
期刊论文
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2021, 页码: 16
作者:
Xue, Wei
;
Zhong, Ping
;
Zhang, Wensheng
;
Yu, Gaohang
;
Chen, Yebin
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2021/03/08
SVM
Max-margin classification
Hinge loss
Elastic net
Online learning
Research on Intrusion Detection of Industrial Control System Based on FastICA-SVM Method
会议论文
Dublin, Ireland, July 19-23, 2021
作者:
Chen, Haonan
;
Liu XD(刘贤达)
;
Wang TY(王天宇)
;
Zhang, Xuejing
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2021/08/21
Intrusion detection
FastICA
SVM
A Real-Time and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support Vector Machine
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2020, 卷号: 7, 期号: 3, 页码: 790-799
作者:
Hao Zhang
;
Yongdan Li
;
Zhihan Lv
;
Arun Kumar Sangaiah
;
Tao Huang
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2021/03/11
Deep belief network (DBN)
flow calculation
frequent pattern
intrusion detection
sliding window
support vector machine (SVM)
Security monitoring method for ICS based on information gain ratio and maximum entropy model
会议论文
Shanghai, China, November 6-8, 2020
作者:
Li SG(李声刚)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Lu, Yan
;
Dong, Zhiwei
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2021/03/14
Industrial control system
Information gain ratio
Maximum entropy model
Security monitoring
Semi-supervised tri-Adaboost algorithm for network intrusion detection
期刊论文
2019, 卷号: 15
作者:
Yuan, Yali
;
Huo, Liuwei
;
Yuan, Yachao
;
Wang, Zhixiao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/20
Network intrusion detection
tri-training method
Adaboost algorithms
chi-square method
execution time
detection rate
An Architectural-Enhanced Secure Design in Embedded System
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Zhang, Z.
;
Zhang, X.
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/30
Cryptography
Hardware security
Intrusion detection
Software engineering
Architectural enhancement
Buffer overflows
Cryptographic algorithms
execution behavior
Memory authentication
Performance loss
Security solutions
Software and hardwares
Embedded systems
Research on Abnormal Detection Based on Improved Combination of K - Means and SVDD
会议论文
Ottawa, ON, Canada, September 13, 2017 - September 15, 2017
作者:
Hao, Xiaohong
;
Zhang, Xiaofeng
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Errors
Image resolution
Intrusion detection
K-means clustering
Network security
Sampling
Signal detection
Statistical tests
Abnormal detection
Anomaly-detection algorithms
False alarm rate
High detection rate
Improved K-Means algorithm
Network intrusion detection
Security protection
Training sample
Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid
期刊论文
Computers and Security, 2018, 卷号: 77, 页码: 547-564
作者:
Zheng M(郑萌)
;
Liang W(梁炜)
;
Xiao Y(肖杨)
;
Xia XF(夏小芳)
;
Fu XY(付兴银)
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2018/06/17
Smart grid
Malicious meter inspection
Theft of electricity
Grouping
Intrusion detection
Security
An intrusion detection system based on machine learning for CAN-Bus
期刊论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2018, 卷号: 221, 页码: 285-294
作者:
Tian, D.
;
Li, Y.
;
Wang, Y.
;
Duan, X.
;
Wang, C.
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Adaptive boosting
Artificial intelligence
Computer crime
Control system synthesis
Data handling
Data mining
Decision trees
Entropy
Intelligent systems
Intrusion detection
Learning algorithms
Learning systems
Mercury (metal)
Metadata
Security of data
Trees (mathematics)
CAN bus
Detection performance
Feature construction
GBDT
Gradient boosting
Intrusion Detection Systems
True positive rates
Vehicle control system
Network security
©版权所有 ©2017 CSpace - Powered by
CSpace