×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业技术... [2]
兰州理工大学 [1]
兰州大学 [1]
武汉轻工大学 [1]
内容类型
会议论文 [3]
期刊论文 [2]
发表日期
2014 [5]
学科主题
computer s... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共5条,第1-5条
帮助
限定条件
发表日期:2014
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Design of a worm isolation and unknown worm monitoring system based on Honeypot
会议论文
2014 International Conference on Logistics Engineering, Management and Computer Science, LEMCS 2014, Shenyang, China, December 21, 2013
作者:
Al Fraih Abdul Aziz Nasser, A.
;
Chen, Wenbo
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/01/18
Intrusion detection
Computer crime
Computer networks
Data mining
Mobile security
Network security
Virtual addresses
Data mining technology
Honeypots
Intrusion Detection Systems
Network intrusions
Snort
Tools and methods
Worm
Worm monitoring system
Current Status and Development Trend of Research of Computer Forensic
期刊论文
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 卷号: Vol.496-500, 页码: 2208-2215
作者:
ZhaoZhenZhou
;
FuZhongYong
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
computer
forensic
electronic
evidence
computer
crime
information
security
Current Status and Development Trend of Research of Computer Forensic
期刊论文
Applied Mechanics and Materials, 2014, 卷号: Vol.496-500, 页码: 2208-2215
作者:
ZhongYongFu
;
ZhenZhouZhao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
Computer
Crime
Computer
Forensic
Electronic
Evidence
Information
Security
Study On Prevention and Control Countermeasures of Information Technical Crimes in Finance
会议论文
作者:
Yang Shulong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/27
Financial Industry
Computer Crime
Prevention and Control Countermeasures
A new intrusion detection method based on machine learning in mobile Ad hoc NETwork
会议论文
Seoul, Korea, Republic of, April 10, 2014 - April 11, 2014
作者:
Cao, Lai Cheng
;
Han, Wei
;
Dong, Sheng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/15
Adaptive boosting
Artificial intelligence
Computer crime
Dynamic loads
Errors
Learning systems
Mobile ad hoc networks
Telecommunication networks
Anomaly intrusion detection
Area of interest
False alarm rate
False negative rate
False positive rates
Heavy traffic load
Intrusion detection method
Intrusion Detection Systems
©版权所有 ©2017 CSpace - Powered by
CSpace