正在加载图片...
·1084· 工程科学学报,第41卷,第8期 detection system using a filter-based feature selection algorithm. 程,2013,39(11):131) IEEE Trans Comput,2016,65(10):2986 [18]Zhou C J,Huang S,Xiong N X,et al.Design and analysis of [14]Duan Q C,Zhou H X,Zeng Y,et al.Application of PSOEM- multimodel-based anomaly intrusion detection systems in industri- ISSVM in medium and long term power load forecasting.Comput al process automation.IEEE Trans Syst Man Cybernetics Syst. Sc,2013,40(6A):41 2015,45(10):1345 (段其昌,周华鑫,曾勇,等.带扩展记忆的粒子群优化最小 [19]Lu Y,Yu X Z.Intrusion detection technology of many-core plat- 二乘支持向量机在中长期电力负荷预测中的应用.计算机科 form based on parallel queue.Intell Comput Appl,2017,7(5): 学,2013.40(6A):41) 82 [15]Qiao Z L,Zhang L,Zhou JX,et al.Soft sensor modeling meth- (陆遥,余翔湛.基于并行队列的众核平台入侵检测系统. od based on improved CPSO-ISSVM and its applications.ChinJ 智能计算机与应用,2017,7(5):82) Sci1 nstrum,2014,35(1):234 [20]Wu Z J,Zhang L Y,Yue M.Low-rate DoS attacks detection (乔宗良,张蕾,周建新,等.一种改进的CPS0-LSSVM软 based on network multifractal.IEEE Trans Dependable Secure 测量模型及其应用.仪器仪表学报,2014,35(1):234) Comput,2016,13(5):559 [16]Huang W Y.Gao Y Q,Zhang Y H.Tuning PID parameters [21] Ntalampiras S.Detection of integrity attacks in cyber-physical using modified CPSO algorithm.Comput Sci,2014,41(11):278 critical infrastructures using ensemble modeling.IEEE Trans Ind (黄为勇,高玉芹,张艳华.一种采用改进CPSO算法的PD Informatics,2015,11(1)104 参数整定方法.计算机科学,2014,41(11):278) [22]Sun LL,Song W F.Network intrusion detection by combination [17]Liu M Z.Network intrusion detection based on CPSO-LSSVM. of CPSO and LSSVM.Comput Eng Appl,2013,49(9):90 Comput Eng,2013,39(11):131 (孙兰兰,宋雯斐.CPS0和LSSVM融合的网络人侵检测 (刘明珍.基于CPO-LSSVM的网络入侵检测.计算机工 计算机工程与应用,2013,49(9):90)工程科学学报,第 41 卷,第 8 期 detection system using a filter鄄based feature selection algorithm. IEEE Trans Comput, 2016, 65(10): 2986 [14] Duan Q C, Zhou H X, Zeng Y, et al. Application of PSOEM鄄鄄 LSSVM in medium and long term power load forecasting. Comput Sci, 2013, 40(6A): 41 (段其昌, 周华鑫, 曾勇, 等. 带扩展记忆的粒子群优化最小 二乘支持向量机在中长期电力负荷预测中的应用. 计算机科 学, 2013, 40(6A):41) [15] Qiao Z L, Zhang L, Zhou J X, et al. Soft sensor modeling meth鄄 od based on improved CPSO鄄鄄LSSVM and its applications. Chin J Sci Instrum, 2014, 35(1): 234 (乔宗良, 张蕾, 周建新, 等. 一种改进的 CPSO鄄鄄 LSSVM 软 测量模型及其应用. 仪器仪表学报, 2014, 35(1): 234) [16] Huang W Y, Gao Y Q, Zhang Y H. Tuning PID parameters using modified CPSO algorithm. Comput Sci, 2014, 41(11): 278 (黄为勇, 高玉芹, 张艳华. 一种采用改进 CPSO 算法的 PID 参数整定方法. 计算机科学, 2014, 41(11): 278) [17] Liu M Z. Network intrusion detection based on CPSO鄄鄄 LSSVM. Comput Eng, 2013, 39(11): 131 (刘明珍. 基于 CPSO鄄鄄 LSSVM 的网络入侵检测. 计算机工 程, 2013, 39(11): 131) [18] Zhou C J, Huang S, Xiong N X, et al. Design and analysis of multimodel鄄based anomaly intrusion detection systems in industri鄄 al process automation. IEEE Trans Syst Man Cybernetics Syst, 2015, 45(10): 1345 [19] Lu Y, Yu X Z. Intrusion detection technology of many鄄core plat鄄 form based on parallel queue. Intell Comput Appl, 2017, 7(5): 82 (陆遥, 余翔湛. 基于并行队列的众核平台入侵检测系统. 智能计算机与应用, 2017, 7(5): 82) [20] Wu Z J, Zhang L Y, Yue M. Low鄄rate DoS attacks detection based on network multifractal. IEEE Trans Dependable Secure Comput, 2016, 13(5): 559 [21] Ntalampiras S. Detection of integrity attacks in cyber鄄physical critical infrastructures using ensemble modeling. IEEE Trans Ind Informatics, 2015, 11(1): 104 [22] Sun L L, Song W F. Network intrusion detection by combination of CPSO and LSSVM. Comput Eng Appl, 2013, 49(9): 90 (孙兰兰, 宋雯斐. CPSO 和 LSSVM 融合的网络入侵检测. 计算机工程与应用, 2013, 49(9): 90) ·1084·
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有