相似文献/References:
[1]李雷 付东阳.基于分层模型的无线传感器网络分簇路由算法[J].计算机技术与发展,2010,(01):132.
LI Lei,FU Dong-yang.Clustering Protocol Algorithm of Wireless Sensor Networks Based on Level Model[J].,2010,(07):132.
[2]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(07):143.
[3]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(07):151.
[4]魏烨嘉 王汝传[] 李伟伟 黄海平[] 孙力娟[].基于普适计算环境的三维空间RSSI位置感知研究[J].计算机技术与发展,2010,(04):183.
WEI Ye-jia,WANG Ru-ehuan[],LI Wei-wei,et al.Research on RSSI- Based Location- Aware in Three- Dimensional Space for Pervasive Computing Environment[J].,2010,(07):183.
[5]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(07):148.
[6]邓黎黎 刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,(06):159.
DENG Li-li,LIU Cai-xing.Research of Trust-Based Secure Routing Protocols for Wireless Sensor Networks[J].,2010,(07):159.
[7]杜鹏雷 吴晓 杨丽平 江涌.面向精准农业的感知节点传感器驱动与控制[J].计算机技术与发展,2010,(06):233.
DU Peng-lei,WU Xiao,YANG Li-ping,et al.Drive and Control of Sensor Node Facing Precision Agriculture[J].,2010,(07):233.
[8]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(07):254.
[9]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(07):162.
[10]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(07):170.
[11]高建斌 娄渊胜.面向主动防御的无线传感器网络安全框架[J].计算机技术与发展,2012,(09):228.
GAO Jian-bin,LOU Yuan-sheng.Security Framework Oriented Active Defense for Wireless Sensor Network[J].,2012,(07):228.