ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Study on network security intrusion target detection method in big data environment
International Journal of Internet Protocol Technology
◽
10.1504/ijipt.2021.118966
◽
2021
◽
Vol 14
(4)
◽
pp. 240
Author(s):
Jia Chen
◽
Yingkai Miao
Keyword(s):
Big Data
◽
Network Security
◽
Target Detection
◽
Detection Method
◽
Data Environment
Start Chat
Download Full-text
Related Documents
Cited By
References
Study on network security intrusion target detection method in big data environment
International Journal of Internet Protocol Technology
◽
10.1504/ijipt.2021.10042643
◽
2021
◽
Vol 14
(4)
◽
pp. 240
Author(s):
Jia Chen
◽
Yingkai Miao
Keyword(s):
Big Data
◽
Network Security
◽
Target Detection
◽
Detection Method
◽
Data Environment
Start Chat
Download Full-text
DDoS attack detection method based on network abnormal behaviour in big data environment
International Journal of Computational Science and Engineering
◽
10.1504/ijcse.2020.10032261
◽
2020
◽
Vol 23
(1)
◽
pp. 22
Author(s):
Jing Chen
◽
Ruomeng Xu
◽
Fengkai Wang
◽
Jieren Cheng
◽
Xiangyan Tang
Keyword(s):
Big Data
◽
Detection Method
◽
Attack Detection
◽
Abnormal Behaviour
◽
Ddos Attack
◽
Data Environment
◽
Ddos Attack Detection
Start Chat
Download Full-text
Research on Intrusion Detection Method and Strategy of Industrial Internet Based on Big Data Environment
10.1109/cei52496.2021.9574516
◽
2021
◽
Author(s):
Zhengqin Wang
Keyword(s):
Big Data
◽
Intrusion Detection
◽
Detection Method
◽
Industrial Internet
◽
Data Environment
Start Chat
Download Full-text
DDoS attack detection method based on network abnormal behaviour in big data environment
International Journal of Computational Science and Engineering
◽
10.1504/ijcse.2020.110182
◽
2020
◽
Vol 23
(1)
◽
pp. 22
Author(s):
Jing Chen
◽
Xiangyan Tang
◽
Jieren Cheng
◽
Fengkai Wang
◽
Ruomeng Xu
Keyword(s):
Big Data
◽
Detection Method
◽
Attack Detection
◽
Abnormal Behaviour
◽
Ddos Attack
◽
Data Environment
◽
Ddos Attack Detection
Start Chat
Download Full-text
Strength Detection Method for Subway Vehicle Bogie Frame in Big Data Environment
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Advanced Hybrid Information Processing
◽
10.1007/978-3-030-67874-6_41
◽
2021
◽
pp. 442-451
Author(s):
Wang Shi
◽
Hu Hai-tao
◽
Zhou Ye-ming
◽
Wang Yu-guang
◽
Zhao Wei
◽
...
Keyword(s):
Big Data
◽
Detection Method
◽
Bogie Frame
◽
Data Environment
Start Chat
Download Full-text
Network security Mode analysis based on big data environment
2020 International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)
◽
10.1109/icbase51474.2020.00018
◽
2020
◽
Author(s):
Shuning Xu
Keyword(s):
Big Data
◽
Network Security
◽
Mode Analysis
◽
Data Environment
Start Chat
Download Full-text
Research on Network Security Visualization under Big Data Environment
2016 International Computer Symposium (ICS)
◽
10.1109/ics.2016.0135
◽
2016
◽
Author(s):
Tingting Yang
◽
Shuwen Jia
Keyword(s):
Big Data
◽
Network Security
◽
Data Environment
Start Chat
Download Full-text
Big Data Environment and Humanities Platform
10.33645/cnc.2017.10.39.5.177
◽
2017
◽
Vol 39
(5)
◽
pp. 177-202
Author(s):
Hyun-Cheol Choi
Keyword(s):
Big Data
◽
Data Environment
Start Chat
Download Full-text
Methodology for the Construction of Predictive Analysis Systems as Exemplified by the Mining Equipment In the Big Data Environment Using Smart Agents And Cybernetic Systems
Advances in Cyber-Physical Systems
◽
10.23939/acps2018.01.033
◽
2018
◽
Vol 3
(1)
◽
pp. 33-43
Author(s):
Andriy Kupin
◽
◽
Rodion Ivchenko
Keyword(s):
Big Data
◽
Predictive Analysis
◽
Mining Equipment
◽
Data Environment
Start Chat
Download Full-text
A Comparative Study on the Legislation about Anonymization or De-identification for Personal Information in Big Data Environment
Korean Association of International Association of Constitutional Law
◽
10.24324/kiacl.2019.25.2.131
◽
2019
◽
Vol 25
(2)
◽
pp. 131-163
Author(s):
Na Roo Kim
Keyword(s):
Big Data
◽
Comparative Study
◽
Personal Information
◽
Data Environment
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close