Results 11 to 20 of about 7,772 (145)

App-DDoS detection method based on K-means multiple principal component analysis [PDF]

open access: yes, 2014
Aiming at the application layer distributed deny of service(App-DDoS) attacks, a K-means multiple principal component analysis algorithm(KMPCAA) utilizing the Web log mining was proposed, then an App-DDoS detection method based on KMPCAA was presented ...
Hong-yu YANG, Yuan CHANG
core   +1 more source

基于模糊逻辑和D-S证据理论的变压器故障诊断方法

open access: yesGaoya dianqi, 2022
采用扩展模糊逻辑对变压器油中溶解气体和铁心接地在线监测数据进行故障基础概率分配计算,利用Dempster-Shafer(D-S)证据理论对各类型故障基础概率进行多源信息融合得出变压器故障诊断模型,通过10台变压器样本对模型进行验证,同时对比支持向量机和卷积神经网络故障诊断模型,得出所提出的方法从故障诊断正确率和稳定性更优。
詹仲强   +5 more
doaj  

Identifying vital nodes algorithm in social networks fusing higher-order information [PDF]

open access: yes, 2019
Identifying vital nodes is a basic problem in complex network research.The existing theoretical framework,mainly considered from the lower-order structure of node-based and edge-based relations often ignores important factors such as interactivity and ...
Guanghui YAN   +4 more
core   +1 more source

Evidence combination based on the degree of credibility and falsity [PDF]

open access: yes, 2015
D-S evidence theory has been widely used in various fields of information fusion due to its efficiency in deal-ing with uncertain information.Unfortunately,combination of conflicting evidences by classical Dempster's rule may produce counter-intuitive ...
ANGXiao-dan W   +3 more
core   +1 more source

基于多源信息融合的金属氧化物避雷器运行状态评价方法

open access: yesDianci bileiqi, 2023
为提高对金属氧化物避雷器(MOA)运行状态的准确把控能力,提出了基于多源信息融合的MOA运行状态评价方法。该方法通过评估运行巡视、带电测试与停电试验等数据对MOA运行状态的影响,建立了多源信息评价标准;应用长短期记忆循环神经网络(LSTM-RNN)、CART决策树与D-S证据理论构建了MOA运行状态评价模型;最后运用该模型对不同变电站的3个间隔9支MOA进行跟踪测试。结果显示,该模型的评价结果与停电试验结果相一致,证明了该模型对MOA运行状态评价的有效性 ...
朱育钊, 方文田, 方逸越, 李涛
doaj  

SIM: a secure IP protocol for MANET [PDF]

open access: yes, 2013
According to the core logic of IP Sec, a secure IP protocol was proposed for Mobile Ad Hoc network. Security deal to the packets in and out of the network protocol stack was done by adding a transparent secure layer between trans-port-layer and link ...
Rong-sen LI, Wen-hua DOU
core   +1 more source

Network threat situation assessment based on unsupervised multi-source data feature analysis [PDF]

open access: yes, 2020
Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a ...
Fengyan WANG, Hongyu YANG
core   +1 more source

Bridge Damage Detection under Structural Health Monitoring System Based on Influence Lines [PDF]

open access: yes, 2016
在过去几十年内,中国修建了许多大跨径桥梁,这些桥梁一经建成就开始了结构劣化的过程,且损伤在整个服役期间不断累积,该类损伤甚至可能造成桥梁坍塌事故。因此,不少新建的大跨桥梁上都安装了结构健康监测系统,用以监测桥梁健康状态。但截止至目前,将健康监测系统的实测数据运用于桥梁损伤识别,至少有以下三点关键问题尚未有效解决:(1)从监测系统的实测数据中提取出对损伤敏感而对环境变化不敏感的损伤指标;(2)利用监测系统多传感器信息增强损伤决策的可信度;(3)优化传感器布置方案以达到最好的损伤识别效果 ...
蔡亲霖
core  

Curve Decision Fusion-Based Saturation Attack Detection Method in SDN [PDF]

open access: yes
Saturation attacks against Software Defined Network (SDN) switches and controllers are major security issues in SDN. When using ensemble learning methods to detect saturation attacks, existing methods typically use simple distance or entropy calculations
Yunhe CUI, Jianpeng ZHAO, Hongzhen YANG, Xianchao LI
core   +1 more source

Survey on network system security metrics [PDF]

open access: yes, 2019
With the improvement for comprehensive and objective understanding of the network system,the research and application of network system security metrics (NSSM) are noticed more.The quantitative evaluation of network system security is developing towards ...
Chensi WU   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy