[1] |
Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG.
A Ransomware Classification Method Based on Visualization
[J]. Netinfo Security, 2020, 20(4): 31-39.
|
[2] |
Yifeng DU, Yuanbo GUO.
A Dynamic Access Control Method for Fog Computing Based on Trust Value
[J]. Netinfo Security, 2020, 20(4): 65-72.
|
[3] |
Zewen MA, Yang LIU, Hongping XU, Hang YI.
DoS Traffic Identification Technology Based on Integrated Learning
[J]. Netinfo Security, 2019, 19(9): 115-119.
|
[4] |
Guanheng CHEN, Jinshu SU.
Abnormal Traffic Detection Algorithm Based on Deep Neural Network
[J]. Netinfo Security, 2019, 19(6): 68-75.
|
[5] |
Chunqi TIAN, Jing LI, Wei WANG, Liqing ZHANG.
A Method for Improving the Performance of Spark on Container Cluster Based on Machine Learning
[J]. Netinfo Security, 2019, 19(4): 11-19.
|
[6] |
Jianwei HU, Wei ZHAO, Zheng YAN, Rui ZHANG.
Analysis and Implementation of SQL Injection Vulnerability Mining Technology Based on Machine Learning
[J]. Netinfo Security, 2019, 19(11): 36-42.
|
[7] |
Jian ZHANG, Bohan CHEN, Liangyi GONG, Zhaojun GU.
Research on Malware Detection Technology Based on Image Analysis
[J]. Netinfo Security, 2019, 19(10): 24-31.
|
[8] |
Weiping WEN, Jingwei LI, Yingnan JIAO, Hailin LI.
A Vulnerability Detection Method Based on Random Detection Algorithm and Information Aggregation
[J]. Netinfo Security, 2019, 19(1): 1-7.
|
[9] |
Yingchao YU, Lin DING, Zuoning CHEN.
Research on Attacks and Defenses towards Machine Learning Systems
[J]. Netinfo Security, 2018, 18(9): 10-18.
|
[10] |
Yang ZHANG, Yuangang YAO.
Research on Network Intrusion Detection Based on Xgboost
[J]. Netinfo Security, 2018, 18(9): 102-105.
|
[11] |
Weiping WEN, Bozhi WU, Yingnan JIAO, Yongqiang HE.
Design and Implementation on Malicious Documents Detection Tool Based on Machine Learning
[J]. Netinfo Security, 2018, 18(8): 1-7.
|
[12] |
Xiang HE, Sheng LIU, Jiguo JIANG.
Comparative Study of Intrusion Detection Methods Based on Machine Learning
[J]. Netinfo Security, 2018, 18(5): 1-11.
|
[13] |
Hongsong CHEN, Gang WANG, Jianlin SONG.
Research on Anomaly Behavior Classification Algorithm of Internal Network User Based on Cloud Computing Intrusion Detection Data Set
[J]. Netinfo Security, 2018, 18(3): 1-7.
|
[14] |
Guihua DUAN, Zhuoxiang SHEN, Dongjie SHEN, Zhi LI.
Research on a Download Link Recognition Scheme Based on Feature Extraction
[J]. Netinfo Security, 2018, 18(10): 31-36.
|
[15] |
Xu CHEN, Yukun LI, Huaping YUAN, Wenyin LIU.
Phishing Detection System Based on Classification Confidence and Website Features
[J]. Netinfo Security, 2017, 17(9): 111-114.
|