相似文献/References:
[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(06):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(06):151.
[3]陶善旗 李俊 郭伟群 李海龙.入侵检测系统中模式匹配算法的研究与改进[J].计算机技术与发展,2010,(02):167.
TAO Shan-qi,LI Jun,GUO Wei-qun,et al.Research and Improvement of Pattern Matching Algorithm for Intrusion Detection System[J].,2010,(06):167.
[4]林倩瑜 冯少荣 张东站.基于神经网络和模式匹配的股票预测研究[J].计算机技术与发展,2010,(05):17.
LIN Qian-yu,FENG Shao-rong,ZHANG Dong-zhan.Stock Market Forecasting Research Based on Neural Network and Pattern Matching[J].,2010,(06):17.
[5]王艳敏 谢强 丁秋林.基于本体和Web Services的数据交换平台[J].计算机技术与发展,2010,(05):112.
WANG Yan-min,XIE Qiang,DING Qiu-lin.Data Exchange Platform Based on Ontology and Web Services[J].,2010,(06):112.
[6]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(06):148.
[7]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(06):254.
[8]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(06):162.
[9]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(06):170.
[10]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(06):168.
[11]段丹青 陈松乔 杨卫平.融合漏洞扫描的入侵检测系统模型的研究[J].计算机技术与发展,2006,(05):131.
DUAN Dan-qing,CHEN Song-qiao,YANG Wei-ping.An Intrusion Detection System Model Merged Vulnerability Scanner[J].,2006,(06):131.
[12]甘学士 孙力娟.改进的模式匹配算法及在入侵检测中的应用[J].计算机技术与发展,2006,(07):150.
GAN Xue-shi,SUN Li-juan.An Improved Algorithm for Pattern Matching and Its Application Intrusion Detection System[J].,2006,(06):150.