期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
改进人工大猩猩部队优化算法的WSN网络覆盖 被引量:1
1
作者 贾鹤鸣 饶洪华 +3 位作者 李玉海 文昌盛 孟彬 陈嘉玫 《龙岩学院学报》 2023年第5期1-7,共7页
为了建立一个保障网络通信需求以及低耗能的无线传感器网络,提出一种融合智能优化算法的网络部署方案。对部署区域进行二维投影,并结合概率感知模型设计出一种网络覆盖模型;针对人工大猩猩部队优化算法(GTO)在网络部署问题中存在收敛速... 为了建立一个保障网络通信需求以及低耗能的无线传感器网络,提出一种融合智能优化算法的网络部署方案。对部署区域进行二维投影,并结合概率感知模型设计出一种网络覆盖模型;针对人工大猩猩部队优化算法(GTO)在网络部署问题中存在收敛速度较慢以及全局探索能力不足的问题,提出一种改进人工大猩猩部队优化算法(IGTO)。该算法通过引入Tent混沌策略和复合突变策略,改善算法全局探索能力,增加算法收敛速度。在网络覆盖模型中进行仿真测试,验证网络覆盖率评价方案的有效性和工程实用性。结果表明,由IGTO算法部署的无线网络覆盖效率更高,节点分布更加均匀。 展开更多
关键词 无线传感器覆盖 改进人工大猩猩部队优化算法 Tent混沌策略 复合突变策略
下载PDF
Research on Classification of Malware Source Code
2
作者 陈嘉玫 赖谷鑫 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期425-430,共6页
In the face threat of the Internet attack, malware classification is one of the promising solutions in the field of intrusion detection and digital forensics. In previous work, researchers performed dynamic analysis o... In the face threat of the Internet attack, malware classification is one of the promising solutions in the field of intrusion detection and digital forensics. In previous work, researchers performed dynamic analysis or static analysis after reverse engineering. But malware developers even use anti-virtual machine(VM) and obfuscation techniques to evade malware classifiers. By means of the deployment of honeypots, malware source code could be collected and analyzed. Source code analysis provides a better classification for understanding the purpose of attackers and forensics. In this paper, a novel classification approach is proposed, based on content similarity and directory structure similarity. Such a classification avoids to re-analyze known malware and allocates resources for new malware. Malware classification also let network administrators know the purpose of attackers. The experimental results demonstrate that the proposed system can classify the malware efficiently with a small misclassification ratio and the performance is better than virustotal. 展开更多
关键词 MALWARE source code classification static analysis HONEYPOT
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部