Research on an improved wireless network intrusion detection algorithm
Research on an improved wireless network intrusion detection algorithm
出处
《通讯和计算机(中英文版)》
2009年第9期67-70,共4页
Journal of Communication and Computer
-
1阿祥.Wireless Network无线网络网罗无限[J].电脑高手,2003(2):17-19.
-
2黄干,刘涛.无线传感器网络入侵检测研究[J].绵阳师范学院学报,2015,34(2):66-70.
-
3ZHAO Chuan-xin,WANG Ru-chuan.Multi-channel Assignment in Multi-hop Wireless Network[J].南京邮电大学学报(自然科学版),2010,30(1):18-25.
-
4Lei Zhenzhou (China Academy of Telecommunications Research of Mil, Beijing 100083, China).Wireless Network Technologies Supporting M2M Applications[J].ZTE Communications,2005,3(1):6-9.
-
5伍连啟.基于SDN的WLAN功率控制技术研究[J].广东通信技术,2017,37(2):76-79. 被引量:1
-
6GE Zhihui LIANG Anzhong LI Taoshen.EEFA: Energy Efficiency Frame Aggregation Scheduling Algorithm for IEEE 802.11n Wireless Network[J].China Communications,2014,11(3):19-26. 被引量:3
-
7Li Yun Zhou Yahui Liu Qilie Wang Xiaoying.The Connectivity Analysis of Intermittent Connected Wireless Network[J].中国电子商情(通信市场),2009(2):79-86.
-
8容错技术、误差校验、故障诊断、计算机安全[J].电子科技文摘,2002,0(11):100-102.
-
9吴冬妮.一种基于粗糙集理论的入侵检测方法[J].制造业自动化,2012,34(24):54-56.
-
10周安福,刘敏,焦学武.Convergence Analysis and Its Application in the Fixed Point Formulation of Medium Access in Wireless Network[J].China Communications,2011,8(1):43-49.