[1] |
WEI Mingjun, ZHANG Xinnan, LIU Yazhi, ZHOU Taiyu.
A network intrusion detection method based on SSA-BRF
[J]. Journal of Hebei University(Natural Science Edition), 2022, 42(5): 552-560.
|
[2] |
MA Guofu,WANG Zixian,MA Shengli.
Analysis of the effectiveness of machine learning model in predicting the risk of inmates
[J]. Journal of Hebei University (Natural Science Edition), 2017, 37(4): 426-433.
|
[3] |
MA Guofu,WANG Zixian,MA Shengli.
Prediction of the risk of offenders based on big data
[J]. Journal of Hebei University (Natural Science Edition), 2016, 36(6): 657-666.
|
[4] |
MA Guofu,MA Shengli,WANG Zixian,LI Shuangyin,CHENG Yusi.
Application of data recovery in the electronic data forensics and judicial identification
[J]. Journal of Hebei University (Natural Science Edition), 2015, 35(5): 538-545.
|
[5] |
XIAO Xianqian,ZHU Junping,JING Xu,MA Qiaoe.
One-class intrusion detection technique based on Bayesian approach
[J]. Journal of Hebei University (Natural Science Edition), 2014, 34(1): 7-13.
|
[6] |
WANG Lei,WANG Fang,YAO Wei,CHENG Hong,LI Zhi-ping.
Technology of Producing Intrusion Rules Based of Fuzzy Decision Tree
[J]. Journal of Hebei University (Natural Science Edition), 2008, 28(4): 438-442.
|
[7] |
LIU Yu-ling,DU Rui-zhong.
Application of Multi Neural Network Model Based on Fuzzy Integral in Intrusion Detection
[J]. Journal of Hebei University (Natural Science Edition), 2008, 28(3): 312-317.
|
[8] |
MA Guo-fu,ZHANG Zhe,ZHANG Dong,ZHANG Hong-yi.
Research and Implementation of Digital Forensic System in Web
[J]. Journal of Hebei University (Natural Science Edition), 2008, 28(3): 327-330.
|
[9] |
ZHANG Shou-hua,YI Kai,WANG Zhen-duo,REN Zhi-li,LIU Zhen-peng.
Mining of Recognition Rules in GECISM
[J]. Journal of Hebei University (Natural Science Edition), 2007, 27(2): 204-208.
|
[10] |
WANG Lei,WANG Pei,GAO Ya-jun,HU Chen-li.
Communication Mechanism and Load Balancing Design on Peer-to-Peer Structure
[J]. Journal of Hebei University (Natural Science Edition), 2007, 27(1): 107-112.
|
[11] |
WU Mei-mei,WANG Feng-xian,LI Ren-ling,ZHAO Shuang,XIE Bo-jun.
Rules Extracting and Rule Bases Constructing Based on Mobile Agent in Computer Immune
[J]. Journal of Hebei University (Natural Science Edition), 2006, 26(4): 443-448.
|
[12] |
WANG Ai-min,ZHANG Kun,ZHAO Xiao-nan.
Study on Predictive Radio Access Model in CDMA Network
[J]. Journal of Hebei University (Natural Science Edition), 2005, 25(3): 332-337.
|
[13] |
.
Constructing Method and Application on a Kind of Non-self Set
[J]. Journal of Hebei University (Natural Science Edition), 2004, 24(4): 434-437.
|
[14] |
.
GECISM--A General Computer Immune System Mode
[J]. Journal of Hebei University (Natural Science Edition), 2003, 23(4): 425-429.
|
[15] |
QI Yuanxing, CUI Shuangxi.
Application of integrated learning in the intrusion detection of power grid false data
[J]. Journal of Hebei University(Natural Science Edition), 2022, 42(1): 105-112.
|