Network security situation assessment architecture based on multi-source heterogeneous data fusion

C Liwei, T Xiaoxiong, Z Yuqing, Q Yuhua… - CAAI Transactions on …, 2021 - tis.hrbeu.edu.cn
… of five modules: a traffic detection module, attribute extraction … strategy of multi-source
heterogeneous data fusion and the idea of … the multi-source heterogeneous data, the exponential …

[PDF][PDF] A design and simulation of adaptive intrusion detection system based on data mining

X Su, T Shi - Computer Science and Application, 2018 - pdf.hanspub.org
… matching detection technique, the article supposes to apply adaptive intrusion detection
According to the technique above, the article proposes to select and adjust detection strategies …

[HTML][HTML] Data Mining from a Statistical Perspective

JH Maindonald - Statistics Consulting Unit, 1999 - blogjava.net
Data sets that are large enough for developing predictive models that can … of heterogeneity
are unusual. The possible or probable extent of heterogeneity will vary from one type of study

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… address the intrusion detection in IoT … IoT huge volume, unstructured data, heterogeneous
data to compute in real-time, which makes the system realistic. The authors propose the large

大数据环境下基于CNN 和WDLSTM 的入侵检测

李发陵, 彭娟 - 西南师范大学学报(自然科学版), 2021 - xbgjxt.swu.edu.cn
… that traditional network intrusion detection methods are difficult to effectively implement
intrusion detection due to the complexity, heterogeneity and large-scale of big data, a hybrid …

[引用][C] Reservoir pore structure and evolution characteristics in the process of water injection development in Fuyu oilfield

T Xiaoyan, Z Weijie, G Aihua - Journal of Xi􀆳 an University of Science and …, 2016

一种基于改进ReliefF 算法的入侵检测模型

刘财辉, 周琪, 叶晓文 - 山东大学学报(工学版), 2023 - gxbwk.njournal.sdu.edu.cn
… extraction in the existing intrusion detection algorithms, the … not accurate enough, an intrusion
detection model based on the … Survey on SDN based network intrusion detection system …

[HTML][HTML] 基于数据挖据的自适应入侵检测系统设计与仿真

苏昕, 史庭俊 - Computer Science and Application, 2018 - hanspub.org
… matching detection technique, the article supposes to apply adaptive intrusion detection
Ac-cording to the technique above, the article proposes to select and adjust detection strategies …

Data Mining for Cyber 𠄁Physical Systems

MV Rao, DA Reddy, A Ampavathi… - Data Mining and …, 2022 - Wiley Online Library
… as neighborhood surveys, is being used to derive valuable data and insights from data obtained
… frameworks are not appropriate for heterogeneous large information preparing, as they …

基于边缘节点技术的电力系统入侵安全防护

李金, 高红亮, 刘科孟, 谢虎 - 现代电力, 2021 - xddl.ncepujournal.com
… A survey of the security assessment and security defense of … An intelligent CSO-DBNN based
cyber intrusion detection model … cabin based on multisource heterogeneous data fusion [J]. …