Author:
Gao Mingming,Wu Yue,Nan Jingchang,Cui Shuyang
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference16 articles.
1. Braga RB, Chaves IA, Oliveira CTD et al (2013) RETENTION: a reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments[J]. J Netw Comput Appl 36(1):274–283
2. Fu L, Zhang T, Zhang H et al (2011) A fuzzy classification method based on feature selection algorithm in malicious script code detection[C]. In: International conference on system science, engineering design and manufacturing Informatization. IEEE, pp 218–221
3. Geraily M, Jahan MV (2012) Fuzzy detection of malicious attacks on web applications based on hidden Markov model ensemble[C]. In: International conference on intelligent systems Modelling & Simulation. IEEE Computer Society, pp 102–108
4. Guo G, Chen Z (2015) A kind of malicious code detection scheme based on fuzzy reasoning[C]. In: International conference on intelligent computation technology and automation. IEEE, pp 19–22
5. Li J, Wei Y (2009) A shortest path algorithm of image segmentation based on fuzzy-rough grid[C]. In: International conference on computational intelligence and software engineering. IEEE, pp 1–4
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献