-
121
Research on performance optimizations for TCM-KNN network anomaly detection algorithm
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
122
Network anomaly detection based on TCM-KNN and genetic algorithm
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
123
Practice on edge cloud security of telecom operators
Published 2023-04-01Subjects: Get full text
Article -
124
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01Subjects: Get full text
Article -
125
Interestmeasurement and system construction of personal information protectionLI Meiyan
Published 2018-08-01Subjects: Get full text
Article -
126
Research on a dynamic self-learning efficient intrusion detection model
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
127
Deep packet inspection oriented high speed packet parsing architecture
Published 2013-06-01Subjects: Get full text
Article -
128
SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization
Published 2015-04-01Subjects: Get full text
Article -
129
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: “…Network security…”
Get full text
Article -
130
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01Subjects: Get full text
Article -
131
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
132
Challenges and innovative solutions of space-ground integrated network security
Published 2024-06-01Subjects: Get full text
Article -
133
Detecting malicious domain names based on AGD
Published 2018-07-01Subjects: “…network security monitoring…”
Get full text
Article -
134
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01Subjects: Get full text
Article -
135
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: “…network security threat…”
Get full text
Article -
136
A Defense Approach of DAD Attack in Stateless Auto Configuration
Published 2014-04-01Subjects: “…network security…”
Get full text
Article -
137
Application protection in 5G cloud network using zero trust architecture
Published 2020-12-01Subjects: “…network security…”
Get full text
Article -
138
Challenges and key technologies of new Ethernet for intelligent computing center
Published 2024-06-01Subjects: Get full text
Article -
139
Optimal strategy selection method for moving target defense based on signaling game
Published 2019-06-01Subjects: “…network security…”
Get full text
Article -
140
L2/L3 equipment deployment scheme in PTN network architecture
Published 2017-06-01Subjects: Get full text
Article