×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [6]
清华大学 [5]
自动化研究所 [5]
计算技术研究所 [3]
厦门大学 [2]
沈阳自动化研究所 [2]
更多...
内容类型
期刊论文 [21]
会议论文 [4]
学位论文 [3]
其他 [1]
发表日期
2022 [2]
2021 [4]
2020 [2]
2019 [1]
2018 [3]
2017 [1]
更多...
学科主题
地球科学::海洋科学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共29条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2022, 卷号: 9, 期号: 3, 页码: 377-391
作者:
Jun Zhang
;
Lei Pan
;
Qing-Long Han
;
Chao Chen
;
Sheng Wen
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2022/03/09
Cyber-physical system
cybersecurity
deep learning
intrusion detection
pattern classification
Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models
期刊论文
EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022
作者:
Akhtar, Muhammad Shoaib
;
Feng, Tao
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/03/01
cyberattack
machine learning
ensemble learning
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:
Zhang, Zhixia
;
Cao, Yang
;
Cui, Zhihua
;
Zhang, Wensheng
;
Chen, Jinjun
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2021/08/15
Intrusion detection
Security
6G mobile communication
Data models
Protocols
Optimization
Encryption
Controller area network (CAN)
intrusion detection
machine learning (ML)
many-objective optimization
vehicular networks security
A weighted intrusion detection model of dynamic selection
期刊论文
APPLIED INTELLIGENCE, 2021, 卷号: 51, 期号: 7, 页码: -
作者:
Feng, Tao
;
Dou, Manfang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2021/03/12
BIG DATA
ALGORITHM
SECURITY
SYSTEM
ENSEMBLE
A Novel Genetic Algorithm-XGBoost Based Intrusion Detection Method
会议论文
Chongqing, China, June 18-20, 2021
作者:
Sun YY(孙莹莹)
;
Song CH(宋纯贺)
;
Yu SM(于诗矛)
;
Pan H(潘昊)
;
Li T(李桐)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2021/10/17
XGBoost
genetic algorithm
classification
NSL-KDD
prediction
Intrusion detection based on hybrid classifiers for smart grid
期刊论文
Computers and Electrical Engineering, 2021, 卷号: 93, 页码: 1-10
作者:
Song CH(宋纯贺)
;
Sun YY(孙莹莹)
;
Han GJ(韩光洁)
;
Rodrigues Joel J.P.C.
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/06/12
Smart grid
Intrusion detection
Deep learning
LSTMXGBoost
HMMs based masquerade detection for network security on with parallel computing
期刊论文
COMPUTER COMMUNICATIONS, 2020, 卷号: 156, 页码: 168-173
作者:
Liu, Jia
;
Duan, Miyi
;
Li, Wenfa
;
Tian, Xinguang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/12/10
Masquerade detection
Shell command
Anomaly detection
Hidden Markov model
Network intrusion detection model based on multivariate correlation analysis - long short-time memory network
期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 2, 页码: 166-174
作者:
Dong, Rui-Hong
;
Li, Xue-Yong
;
Zhang, Qiu-Yu
;
Yuan, Hui
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/03/30
support vector machines
neural nets
image classification
pattern classification
security of data
recurrent neural nets
learning (artificial intelligence)
network intrusion detection model
multivariate correlation analysis
short-time memory network
low detection performance
time correlation characteristics
intrusion detection datasets
multivariate correlations analysis
short-term memory network
information gain feature selection method
convolutional neural networks
recurrent neural network
classification detection performance
Context aware intrusion detection for building automation systems
期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:
Pan, Zhiwen
;
Hariri, Salim
;
Pacheco, Jesus
收藏
  |  
浏览/下载:64/0
  |  
提交时间:2019/12/10
Internet of Things
Network security
Context awareness
Supervised learning
Data mining
Intrusion detection
Traffic characteristic map-based intrusion detection model for industrial internet
期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 2, 页码: 359-370
作者:
Dong, Rui-Hong
;
Wu, Dong-Fang
;
Zhang, Qiu-Yu
;
Zhang, Tao
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Discrete cosine transforms
Hash functions
Singular value decomposition
Discrete Cosine Transform(DCT)
Hash digest
Industrial controls
Information entropy method
Intrusion detection models
Network traffic
Rule set
Singular value decomposition method
©版权所有 ©2017 CSpace - Powered by
CSpace