A network security situation prediction model based on wavelet neural network with optimized parameters
暂无分享,去创建一个
Haibo Zhang | Qing Huang | Fangwei Li | Jiang Zhu | Haibo Zhang | Fangwei Li | Jiang Zhu | Qing Huang
[1] Gong Zheng-hu,et al. GRNN model of network situation forecast , 2012 .
[2] Jiguo Yu,et al. Network Security Situation Generation and Evaluation Based on Heterogeneous Sensor Fusion , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[3] Justin Zhan,et al. Node attributes and edge structure for large-scale big data network analytics and community detection , 2015, 2015 IEEE International Symposium on Technologies for Homeland Security (HST).
[4] Cyril Onwubiko,et al. Functional requirements of situational awareness in computer network security , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[5] Haipeng Yao,et al. Big Data Analytics in Mobile Cellular Networks , 2016, IEEE Access.
[6] Sushil Jajodia,et al. Cyber Situational Awareness - Issues and Research , 2009, Cyber Situational Awareness.
[7] Feipei Lai,et al. Multiple-Time-Series Clinical Data Processing for Classification With Merging Algorithm and Statistical Measures , 2015, IEEE Journal of Biomedical and Health Informatics.
[8] Paulo J. L. Adeodato,et al. Continuous Dynamical Combination of Short and Long-Term Forecasts for Nonstationary Time Series , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[9] Honggang Wang,et al. A hierarchical packet forwarding mechanism for energy harvesting wireless sensor networks , 2015, IEEE Communications Magazine.
[10] Lei Ying-jie. Method of situation forecast based on function S-Rough sets , 2007 .
[11] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[12] Tung-Kuan Liu,et al. A Novel Crowding Genetic Algorithm and Its Applications to Manufacturing Robots , 2014, IEEE Transactions on Industrial Informatics.
[13] Wang Huiqiang,et al. A Quantitative Prediction Method of Network Security Situation Based on Wavelet Neural Network , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[14] I. Burhan Türksen,et al. Enhanced Fuzzy System Models With Improved Fuzzy Clustering Algorithm , 2008, IEEE Transactions on Fuzzy Systems.
[15] Wu Di,et al. Network Situation Prediction Method Based on Spatial-Time Dimension Analysis , 2014 .
[16] Feng Dengguo,et al. A Network Security Situational Awareness Model Based on Information Fusion , 2009 .
[17] Gong Zheng,et al. Research on Cyberspace Situational Awareness , 2010 .
[18] Honggang Wang,et al. Quality-of-protection-driven data forwarding for intermittently connected wireless networks , 2015, IEEE Wireless Communications.
[19] Yanyan Wang,et al. Dynamic Coding Control in Social Intermittent Connectivity Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[20] Rick Kazman,et al. Network Security Risk Assessment and Management , 2012 .
[21] HU Jun-hong. Method for Constructing Intuitionistic Fuzzy Equivalent Matrixes , 2007 .
[22] Gong Zheng-Hu,et al. Research on Cyberspace Situational Awareness , 2010 .
[23] Fei He,et al. Hybrid Model of Molten Steel Temperature Prediction Based on Ladle Heat Status and Artificial Neural Network , 2014 .
[24] Wang Jian. A situation awareness model of network security based on grey Verhulst model , 2008 .
[25] Q. Henry Wu,et al. Electric Load Forecasting Based on Locally Weighted Support Vector Regression , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[26] Jianping Li,et al. A New Method of Data Preprocessing for Network Security Situational Awareness , 2010, 2010 2nd International Workshop on Database Technology and Applications.
[27] Wen Zhichen. Network security situation prediction method based on hidden Markov model , 2015 .
[28] Yan Yu,et al. A Real-Time Big Data Gathering Algorithm Based on Indoor Wireless Sensor Networks for Risk Analysis of Industrial Operations , 2016, IEEE Transactions on Industrial Informatics.