相似文献/References:
[1]李兵.一种基于对等模型的网络入侵检测系统模型[J].计算机技术与发展,2008,(03):173.
LI Bing.A Distributed Intrusion Detection System Based on Peer - to - Peer Model[J].,2008,(02):173.
[2]吴楠 宋方敏.用C4.5算法对局域网数据报进行行为分类[J].计算机技术与发展,2006,(07):1.
WU Nan,SONG Fang-min.Classify Datagram on LANs by Using C4.5 Classification Algorithm[J].,2006,(02):1.
[3]伍海波,高劲松,唐启涛,等.基于生物免疫原理的网络入侵检测研究[J].计算机技术与发展,2013,(07):167.
WU Hai-bo[],GAO Jing-song[],TANG Qi-tao[],et al.Research on Network Intrusion Detection System Based on Biological Immune Principle[J].,2013,(02):167.
[4]贾慧敏. 基于ML改进技术的IDS的设计与实现[J].计算机技术与发展,2015,25(06):114.
JIA Hui-min. Design and Implementation of IDS Based on ML’ s Improved Technology[J].,2015,25(02):114.
[5]马浩良,谢林柏.基于 SSD 的不平衡样本车辆检测与识别[J].计算机技术与发展,2019,29(12):135.[doi:10. 3969 / j. issn. 1673-629X. 2019. 12. 024]
MA Hao-liang,XIE Lin-bo.Vehicle Detection and Recognition in Unbalanced Samples Based on SSD[J].,2019,29(02):135.[doi:10. 3969 / j. issn. 1673-629X. 2019. 12. 024]
[6]徐胜超,宋 娟,潘 欢.基于 MapReduce 并行关联挖掘的网络入侵检测[J].计算机技术与发展,2021,31(06):123.[doi:10. 3969 / j. issn. 1673-629X. 2021. 06. 022]
XU Sheng-chao,SONG Juan,PAN Huan.Network Intrusion Detection Based on Parallel AssociationMining of MapReduce[J].,2021,31(02):123.[doi:10. 3969 / j. issn. 1673-629X. 2021. 06. 022]
[7]薛 飞,梁 栋,喻 洋.难例挖掘在太赫兹成像目标检测中的应用[J].计算机技术与发展,2021,31(09):124.[doi:10. 3969 / j. issn. 1673-629X. 2021. 09. 021]
XUE Fei,LIANG Dong,YU Yang.Application of Hard Example Mining to Terahertz Imaging Object Detection[J].,2021,31(02):124.[doi:10. 3969 / j. issn. 1673-629X. 2021. 09. 021]
[8]张 凡*,高仲合,牛 琨.基于 BiGRU-SVM 的网络入侵检测模型[J].计算机技术与发展,2023,33(01):144.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 022]
ZHANG Fan*,GAO Zhong-he,NIU Kun.Network Intrusion Detection Model Based on BiGRU-SVM[J].,2023,33(02):144.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 022]