1. A New GHSOM Model Applied to Network Security
2. A GA-based feature selection and parameters optimizationfor support vector machines
3. Identity-based proxy blind signature scheme instandard model [J];ming;Computer Engineering and Applications,2015
4. Intrusion detection and forensic analysis for network security incidents [J];jian;Journal of Huazhong University of Science and Technology (Natural Science Edition),2016
5. Local network intrusion detection algorithm based onempirical mode decomposition [J];xiang;Journal of Southwest ChinaNormal University (Natural Science Edition),2016