-
81
Machine learning-based detection, identification and restoration method of jamming attacks in optical networks
Published 2023-07-01Subjects: Get full text
Article -
82
Traffic anomaly detection method in networks based on improved clustering algorithm
Published 2015-12-01Subjects: “…network security…”
Get full text
Article -
83
Mobile malware traffic detection approach based on value-derivative GRU
Published 2020-01-01Subjects: “…network security…”
Get full text
Article -
84
A network intrusion detection method designed for few-shot scenarios
Published 2023-10-01Subjects: Get full text
Article -
85
Efficient scheme for user's trajectory privacy
Published 2015-12-01Subjects: “…wireless network security…”
Get full text
Article -
86
Research on malicious code variants detection based on texture fingerprint
Published 2014-08-01Subjects: “…network security…”
Get full text
Article -
87
Method for determining the lengths of protocol keywords based on maximum likelihood probability
Published 2016-06-01Subjects: Get full text
Article -
88
End hopping based on message tampering
Published 2013-12-01Subjects: “…network security…”
Get full text
Article -
89
Botnet detecting method based on group-signature filter
Published 2010-01-01Subjects: “…network security…”
Get full text
Article -
90
Two-hop cover-based access control scheme for wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
91
Web plug-in paradigm for anti-DoS attack based on end hopping
Published 2017-10-01Subjects: “…network security…”
Get full text
Article -
92
Analysis of Development Trend and Technology of New Generation Internet
Published 2013-04-01Subjects: Get full text
Article -
93
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
Published 2022-10-01Subjects: Get full text
Article -
94
Research on alert correlation method based on alert confidence in multi-IDS environment
Published 2011-01-01Subjects: “…network security…”
Get full text
Article -
95
Research and implementation of reputation-based inter-domain routing selection mechanism
Published 2023-06-01Subjects: Get full text
Article -
96
AS-level model for restraining DoS attacks
Published 2013-09-01Subjects: “…network security…”
Get full text
Article -
97
Multi-level loss object tracking adversarial attack method based on spatial perception
Published 2021-11-01Subjects: Get full text
Article -
98
Study of a new packet marking scheme for DDoS attack source traceback
Published 2005-01-01Subjects: “…network security…”
Get full text
Article -
99
Finite automaton intrusion tolerance system model based on Markov
Published 2019-10-01Subjects: “…network security…”
Get full text
Article -
100
Study of high-speed malicious Web page detection system based on two-step classifier
Published 2017-08-01Subjects: Get full text
Article