ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Research on Computer Database Intrusion Detection Technology Based on Virtualization Technology
Mapping Intimacies
◽
10.1109/iciscae52414.2021.9590714
◽
2021
◽
Author(s):
Yuwei Yao
Keyword(s):
Intrusion Detection
◽
Detection Technology
◽
Virtualization Technology
◽
Database Intrusion Detection
Download Full-text
Related Documents
Cited By
References
Database Intrusion Detection Technology Based on VGG-SVM
Advances in Intelligent Systems and Computing - 2020 International Conference on Applications and Techniques in Cyber Intelligence
◽
10.1007/978-3-030-53980-1_14
◽
2020
◽
pp. 87-92
Author(s):
Mingyuan Xin
◽
Yong Wang
Keyword(s):
Intrusion Detection
◽
Detection Technology
◽
Database Intrusion Detection
Download Full-text
Online Database Intrusion Detection System Based on Query Signatures
Journal of University of Human Development
◽
10.21928/juhd.20170315.14
◽
2017
◽
Vol 3
(1)
◽
pp. 282-287
Author(s):
Alaa Jumaa
◽
◽
Awezan Omar
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Online Database
◽
Database Intrusion Detection
Download Full-text
Application of OPTICS and ensemble learning for Database Intrusion Detection
Journal of King Saud University - Computer and Information Sciences
◽
10.1016/j.jksuci.2019.05.001
◽
2019
◽
Cited By ~ 2
Author(s):
Sharmila Subudhi
◽
Suvasini Panigrahi
Keyword(s):
Intrusion Detection
◽
Ensemble Learning
◽
Database Intrusion Detection
Download Full-text
A Practical Database Intrusion Detection System Framework
2009 Ninth IEEE International Conference on Computer and Information Technology
◽
10.1109/cit.2009.69
◽
2009
◽
Cited By ~ 4
Author(s):
Yawei Zhang
◽
Xiaojun Ye
◽
Feng Xie
◽
Yong Peng
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
System Framework
◽
Database Intrusion Detection
Download Full-text
Industrial Intrusion Detection Technology Based on One-dimensional Multi-scale Residual Network
10.1145/3467707.3467759
◽
2021
◽
Author(s):
Kong De Peng
◽
Du Ye
◽
Li Mei Hong
◽
Li Gui Ling
Keyword(s):
Intrusion Detection
◽
Residual Network
◽
One Dimensional
◽
Multi Scale
◽
Detection Technology
Download Full-text
Adaptive Database Intrusion Detection Using Evolutionary Reinforcement Learning
International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-319-67180-2_53
◽
2017
◽
pp. 547-556
◽
Cited By ~ 3
Author(s):
Seul-Gi Choi
◽
Sung-Bae Cho
Keyword(s):
Reinforcement Learning
◽
Intrusion Detection
◽
Database Intrusion Detection
Download Full-text
KFDA-waveletcluster based intrusion detection technology
2007 International Conference on Wavelet Analysis and Pattern Recognition
◽
10.1109/icwapr.2007.4421766
◽
2007
◽
Cited By ~ 2
Author(s):
Yu-Xin Wei
◽
Mu-Qing Wu
Keyword(s):
Intrusion Detection
◽
Detection Technology
Download Full-text
The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories
10.2172/6337613
◽
1987
◽
Cited By ~ 1
Author(s):
R.H. Graham
◽
R.M. Workhoven
Keyword(s):
Intrusion Detection
◽
Detection Technology
Download Full-text
The Study on Network Intrusion Detection Technology Based on Improved Principal Component Analysis
Journal of Applied Sciences
◽
10.3923/jas.2013.5099.5105
◽
2013
◽
Vol 13
(22)
◽
pp. 5099-5105
Author(s):
Yu-Ting Lu
Keyword(s):
Principal Component Analysis
◽
Intrusion Detection
◽
Principal Component
◽
Component Analysis
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Detection Technology
Download Full-text
Research on Network Intrusion Detection Technology Based on Improved Principal Component Analysis
International Journal of Digital Content Technology and its Applications
◽
10.4156/jdcta.vol7.issue4.18
◽
2013
◽
Vol 7
(4)
◽
pp. 137-146
Author(s):
LU Yuting
◽
G. Micheson
Keyword(s):
Principal Component Analysis
◽
Intrusion Detection
◽
Principal Component
◽
Component Analysis
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Detection Technology
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close