Advanced Search



5 results found in all.
index Title
1Intrusion detection using rough set classification
Author(s):ZHANG Lian-hua, ZHANG Guan-hua, YU Lang, ZHANG Jie, BAI Ying-cai  Clicked:11462  Download:4532  Cited:16  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.9 P.1076-1086  DOI:10.1631/jzus.2004.1076
2An immunity-based technique to detect network intrusions
Author(s):PAN Feng, DING Yun-fei, WANG Wei-nong  Clicked:6404  Download:3105  Cited:119  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.5 P.371-377  DOI:10.1631/jzus.2005.A0371
3A new data normalization method for unsupervised anomaly intrusion detection
Author(s):Long-zheng Cai, Jian Chen, Yun Ke, Tao Chen, Zhi-gang Li  Clicked:8638  Download:3328  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.778-784  DOI:10.1631/jzus.C0910625
4Detection and localization of cyber attacks on water treatment systems: an entropy-based approach
Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI  Clicked:7044  Download:10218  Cited:0  <Full Text>  <PPT> 447
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.4 P.587-603  DOI:10.1631/FITEE.2000546
5CRGT-SA:an interlaced and spatiotemporal deep learning model for network intrusion detection
Author(s):Jue CHEN, Wanxiao LIU, Xihe QIU, Wenjing LV, Yujie XIONG  Clicked:122  Download:64  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  In Press    DOI:
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE