1. Lewen City Analysis of network security problems in the internal network environment [J ] Electronic Technology and Software Engineering, 2022 (000-011) Lewencheng. Analysis of network security in internal network environment. Electronic Technology and Software Engineering , 2022 (000-011). Lewen City Analysis of network security problems in the internal network environment [J] Electronic Technology and Software Engineering, 2022 (000-011) Lewencheng. Analysis of network security in internal network environment. Electronic Technology and Software Engineering, 2022 (000-011).
2. Lu Yujing An Intrusion Detection Model Based on Deep Belief Network [J] Network Security Technology and Application , 2015 (8): 3 Lu Yujing. An intrusion detection model based on deep belief network [J] . Network Security Technology and Application , 2015 (8): 3. Lu Yujing An Intrusion Detection Model Based on Deep Belief Network [J] Network Security Technology and Application, 2015 (8): 3 Lu Yujing. An intrusion detection model based on deep belief network [J]. Network Security Technology and Application, 2015 (8): 3.
3. Denning D E . An Intrusion-Detection Model[C]// An Intrusion-Detection Model . IEEE Computer Society , 1986 . Denning D E . An Intrusion-Detection Model[C]// An Intrusion-Detection Model. IEEE Computer Society, 1986.
4. Eigen co-occurrence matrix method for masquerade detection[C]/Proceedings of the 7th JSST SIGSYS Workshop on Systems for Programming and Applications (SPA2004), Nagano;Oka M.;JP,2004
5. Brdiczka O , Liu J , Price B , Proactive insider threat detection through graph learning and psychological context[C]//2012 IEEE Symposium on Security and Privacy Workshops . IEEE , 2012 : 142-149. Brdiczka O,Liu J, Price B, Proactive insider threat detection through graph learning and psychological context[C]//2012 IEEE Symposium on Security and Privacy Workshops. IEEE,2012: 142-149.