共 8 条
[1]
Sang L., Jun C., Predicate Encryption for Security of Insider Intrusion Detection System, JDCTA, 5, 1, pp. 204-209, (2011)
[2]
Wang P., Yue H., Li L., An Efficient Automaton Based Matching Algorithm and Its Application in Intrusion Detection System, IJACT, 3, 9, pp. 278-285, (2011)
[3]
Liang H., Tang K., Yu K., Zhao K., Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching, JCIT, 5, 3, pp. 86-94, (2010)
[4]
Min W., Wang R., Han Z., Wavelet-analysis based File-sharing P2P Traffic Prediction Algorithm, JDCTA, 5, 6, pp. 46-54, (2011)
[5]
Hassana G.K., Zou B., Soliman M.S., Optimal Color Image Enhancement Using Wavelet and K-means Clustering, JDCTA, 5, 1, pp. 112-122, (2011)
[6]
Zhong C., Hu Q.-S., Yang F., Yin M.-X., Software Quality Prediction Method with Hybrid Applying Principal Components Analysis and Wavelet Neural Network and Genetic Algorithm, JDCTA, 5, 3, pp. 225-234, (2011)
[7]
Ye Z., Guoqiang C., Yang J., Zhang J., Shi Q., Zeng H., Fault Diagnosis of Railway Rolling Bearing Based on Wavelet Analysis and FCM, JDCTA, 5, 3, pp. 47-58, (2011)
[8]
Li Y., Shan X., Guoqiang W., Comprehensive Evaluation Model for Computer Network Security with Linguistic Information, AISS, 3, 9, pp. 126-131, (2011)