期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于卷积神经网络的目标检测算法综述 被引量:1
1
作者 余潇智 杨静 +1 位作者 李兴超 马文纹 《电子技术与软件工程》 2022年第24期171-176,共6页
本文对基于卷积神经网络的目标检测算法进行综述。文章首先介绍了卷积神经网络的概念与发展历史,其次重点归纳分析了目标检测当前主流的两段检测算法和一段检测算法,并简要介绍了目标检测常用的数据集以及各算法的性能对比,最后进行了... 本文对基于卷积神经网络的目标检测算法进行综述。文章首先介绍了卷积神经网络的概念与发展历史,其次重点归纳分析了目标检测当前主流的两段检测算法和一段检测算法,并简要介绍了目标检测常用的数据集以及各算法的性能对比,最后进行了总结与展望。 展开更多
关键词 目标检测 卷积神经网络 两段检测 检测
下载PDF
Two-Phased Method for Detecting Evasive Network Attack Channels 被引量:2
2
作者 CAO Zigang XIONG Gang +2 位作者 ZHAO Yong GUO Li FANG Binxing 《China Communications》 SCIE CSCD 2014年第8期47-58,共12页
With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontation... With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily. 展开更多
关键词 evasiveencryption SSL X.509detectionnetwork attacks CERTIFICATE ANOMALY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部