Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Kang-feng ZHENG"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 102-112 (2017)
In order to take an active part in network attack and defense,a moving target defense solution on network layer based on OpenFlow was proposed,using the flexibility of network brought by OpenFlow network architecture.On the network layer,through mapp
Externí odkaz:
https://doaj.org/article/7de83022d2334fd6be1494f1ca134a75
Publikováno v:
Applied Sciences, Vol 10, Iss 12, p 4081 (2020)
Personality recognition is a classic and important problem in social engineering. Due to the small number and particularity of personality recognition databases, only limited research has explored convolutional neural networks for this task. In this
Externí odkaz:
https://doaj.org/article/c6eba0a12c624b3ea8e55f417ee9bd77
Publikováno v:
Tongxin xuebao, Vol 36, Pp 135-144 (2015)
Current attack graph-based alert correlation cannot deal with graph relation between alerts properly,and a large number of redundant attack paths may arise when trying to find out missing alerts and predict future attacks.A multi-source alert analyzi
Externí odkaz:
https://doaj.org/article/738fce7f5f044ef6bdb28922a918c43f
Publikováno v:
Tongxin xuebao, Vol 34, Pp 105-110 (2013)
In order to improve the quality of alerts in intrusion detection system (IDS) and reduce the large number of redundant alarms, an IDS alerts clustering algorithm based on chaotic particle swarm optimization was proposed.It made the motion of particle
Externí odkaz:
https://doaj.org/article/ff8d9ae409894e80901198b484a735f9
Publikováno v:
Tongxin xuebao, Vol 34, Pp 128-135 (2013)
With the problem that a large number of undetectable holes existed in negative selection algorithm,an algorithm of directional generating holes’detectors using r -chunk matching rule with variable matching threshold based on hole-set and self-set w
Externí odkaz:
https://doaj.org/article/0da3d3a091d64dc0a4fb10ae37f489b9
Publikováno v:
Tongxin xuebao, Vol 33, Pp 31-37 (2012)
According to the challenges of intrusion detection technique for wireless sensor networks,a danger theory in-spired intrusion detection model was proposed by taking advantage of the working principle of artificial immune system.Due to the distributed
Externí odkaz:
https://doaj.org/article/9d29f5136b074859b417f34122dedaa1
Publikováno v:
Tongxin xuebao, Vol 33, Pp 61-68 (2012)
A new routing lookup algorithm based on Bloom-filter algorithm and parallel back-propagation neural networks (BFBP) was proposed.The algorithm could meet the challenges of routing lookup and just had to learn the network ID moreover,it was equally at
Externí odkaz:
https://doaj.org/article/113da90608ee4c8ba7fe4ee0407ca6a2
Publikováno v:
Tongxin xuebao, Vol 33, Pp 24-30 (2012)
The original particle swarm optimization (PSO)algorithm has the advantages of fast convergence,but with the shortcoming of premature and local convergence.To overcome this problem,a new chaos-particle swarm optimization algorithm was presented,which
Externí odkaz:
https://doaj.org/article/205ccd7b132740fb8b5cf176c83e2c9d
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 5, Iss 5 (2012)
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPP&PP) protocol using network
Externí odkaz:
https://doaj.org/article/152f3a1fa3e940f2bf59542da8e74391
Publikováno v:
Journal of Electronics & Information Technology. 34:2891-2897