×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [5]
上海大学 [2]
西安交通大学 [1]
计算机网络信息中心 [1]
湖南大学 [1]
内容类型
会议论文 [5]
期刊论文 [5]
发表日期
2018 [10]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
限定条件
发表日期:2018
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Droidward: an effective dynamic analysis method for vetting android applications
期刊论文
Cluster computing-the journal of networks software tools and applications, 2018, 卷号: 21, 期号: 1, 页码: 265-275
作者:
Yang, Yubin
;
Wei, Zongtao
;
Xu, Yong
;
He, Haiwu
;
Wang, Wei
收藏
  |  
浏览/下载:59/0
  |  
提交时间:2019/05/09
Android security
Malware analysis
Malware detection
Dynamic analysis
Physical intrusion detection for industrial control system
会议论文
作者:
Liu, Pengfei
;
Liu, Ting
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/11/19
Communication signals
Industrial control systems
Intrusion detection method
Physical layers
RS485
RS485 communications
Security
Voltage signals
Intrusion signal recognition based on optoelectronic reservoir computing in optical fiber perimeter systems
会议论文
FIBER OPTIC SENSING AND OPTICAL COMMUNICATION, 2018-01-01
作者:
Wang, Ningning[1]
;
Fang, Nian[2]
;
Wang, Lutang[3]
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/22
signal recognition
intrusion detection
recurrent neural network
reservoir computing
optical fiber sensing
Anomaly behavior detection and reliability assessment of control systems based on association rules
期刊论文
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 卷号: 22, 页码: 90-99
作者:
Jie, Xinchun[1]
;
Wang, Haikuan[2]
;
Fei, Minrui[3]
;
Du, Dajun[4]
;
Sun, Qing[5]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/22
Anomaly detection
Network intrusion
Association rules
Apriori algorithm
A new evolutionary neural networks based on intrusion detection systems using multiverse optimization
期刊论文
APPLIED INTELLIGENCE, 2018, 卷号: Vol.48 No.8, 页码: 2315-2327
作者:
Benmessahel, Ilyas
;
Xie, Kun
;
Chellal, Mouna
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/26
Multilayer feed forward (MLFF)
Training neural network
Evolutionary algorithm (EA)
Multiverse optimization (MVO)
Intrusion detection systems (IDSs)
An intrusion detection system based on machine learning for CAN-Bus
期刊论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2018, 卷号: 221, 页码: 285-294
作者:
Tian, D.
;
Li, Y.
;
Wang, Y.
;
Duan, X.
;
Wang, C.
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Adaptive boosting
Artificial intelligence
Computer crime
Control system synthesis
Data handling
Data mining
Decision trees
Entropy
Intelligent systems
Intrusion detection
Learning algorithms
Learning systems
Mercury (metal)
Metadata
Security of data
Trees (mathematics)
CAN bus
Detection performance
Feature construction
GBDT
Gradient boosting
Intrusion Detection Systems
True positive rates
Vehicle control system
Network security
A Novel Intrusion Detection System Based on Advanced Naive Bayesian Classification
期刊论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2018, 卷号: 211, 页码: 581-588
作者:
Wang, Y.
;
Li, Y.
;
Tian, D.
;
Wang, C.
;
Wang, W.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
5G mobile communication systems
Classification (of information)
Computer crime
Learning systems
Mercury (metal)
Network security
Pattern recognition
Pattern recognition systems
Security of data
Wireless networks
Classification results
Detection performance
Intrusion Detection Systems
Machine learning models
Naive Bayesian classification
ReliefF
Relieff algorithms
True positive rates
Intrusion detection
An Intrusion Detection System Based on Machine Learning for CAN-Bus
会议论文
INDUSTRIAL NETWORKS AND INTELLIGENT SYSTEMS, INISCOM 2017, 2018-01-01
作者:
Tian, Daxin
;
Li, Yuzhou
;
Wang, Yunpeng
;
Duan, Xuting
;
Wang, Congyu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
CAN-Bus
Information security
IDS
Machine learning
GBDT
Entropy
Detection performance
A novel security validation in embedded system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Li, L.
;
Du, P.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Hardware
Hardware security
Intrusion detection
Program compilers
execution behavior
Experimental analysis
Hardware-assisted
Memory access validations
Performance penalties
Response mechanisms
secure tag
Software vulnerabilities
Embedded systems
An Architectural-Enhanced Secure Design in Embedded System
会议论文
PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018-01-01
作者:
Wang, Xiang
;
Xu, Bin
;
Wang, Weike
;
Zhang, Zhun
;
Zhang, Xiaobing
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
security solution
architectural enhancements
embedded systems
execution behavior
intrusion detection
©版权所有 ©2017 CSpace - Powered by
CSpace