恶意网络攻击防范中的规则匹配方法研究
摘要
关键词
全文:
PDF参考
[1]古平,欧阳源遊.基于混合釆样的非平衡数据集分类研究[J].计算机 应用研究,2015,32(02): 379-381+418. [2]曾铖、韩桂华,基于网络的入侵检测系统分析与设计[J],成都信 息工程学院学报,2016.12(21):86-89. [3]王昕阳等,浅析串模式匹配算法 KMP 及应用[J], 智能计算机与应用,2017.2(11): 57-60. [4]K. Fukushima,“Neocognitron:A self-organizing neural- network model for a Mechanism of Pattern recognition unaffected
by shift in position,Biol. Cybern.,vol.36,pp.193-202,1980. [5]C.Neubauer,Shape, position and size invariant visual pattern recognition based on principles of neocognitron and perception in Artificial Neural
Networks,1.AlexanderandJ.Taylor,Eds. Amsterdam the Netherlands: North一Holland,vol.2,2012,11: 833-837. [6]Van Ooyen and B. Nienhuis,Pattern Recognition in the Neocognitron Is Improved一by Neuronal Adaption,Biological Cyberneties70,pp.47-53(1993). [7]Fukushima K. A hierarchical neural network capable of visual pattern recognition . Neural Networks,1989:2:413-420 [8]Y.Bengio.YLeCun,and D.Henderson,“Globally Trained Handwritten Word Recognizer using Spatial Representation,
Convolutional Neural Networks and Hidden Markov Models in Advances in Neural Information Processing Systems,Jack
D.Cowan,Gerald Tesauro,and Joshua AlsPector,Eds.1994,vol.6,PP.937-944,Morgan Kaufmann Publishers,Inc. [9]崔璐,张鹏,车进.基于深度神经网络的遥感图像分类算法综述 [J].计算机科学,2018,45(Sl):50-53.
Refbacks
- 当前没有refback。