期刊文献+
共找到3,618篇文章
< 1 2 181 >
每页显示 20 50 100
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
1
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 big data Security Authentication ACCESS control In-network data sharing Information-centric network
下载PDF
The Impact of Online Networks and Big Data in Life Sciences
2
作者 Ruchita Gujarathi Fabricio F. Costa 《Social Networking》 2014年第1期58-64,共7页
Advances in Information Technology (IT) have enhanced our ability to gather, collect and analyze information from individuals and specific groups of people online. The emergence of online networks has facilitated conn... Advances in Information Technology (IT) have enhanced our ability to gather, collect and analyze information from individuals and specific groups of people online. The emergence of online networks has facilitated connections between individuals by leveraging data exchange in a variety of fields. Online networking in life sciences transforms data collection into actionable information that will improve individual and population health, deliver effective therapies and, consequently, reduce the cost of healthcare. These novel tools might also have a direct impact in personalized medicine programs, since the adoption of new products by health care professionals in life sciences and peer-to-peer learning could be improved using social networks and big data analytics. However, one of the main concerns of information exchange online is data privacy. In this article, we will review how online networks and big data analytics are impacting the life sciences sector. 展开更多
关键词 Online networks big Data HEALTH Life SCIENCES Patients DISEASES PRIVACY
下载PDF
Content Centric Networking: A New Approach to Big Data Distribution
3
作者 Yi Zhu Zhengkun Mi 《ZTE Communications》 2013年第2期3-10,共8页
In this paper, we explore network architecture anal key technologies for content-centric networking (CCN), an emerging networking technology in the big-data era. We descrihe the structure anti operation mechanism of... In this paper, we explore network architecture anal key technologies for content-centric networking (CCN), an emerging networking technology in the big-data era. We descrihe the structure anti operation mechanism of tl CCN node. Then we discuss mobility management, routing strategy, and caching policy in CCN. For better network performance, we propose a probability cache replacement policy that is based on cotent popularity. We also propose and evaluate a probability cache with evicted copy-up decision policy. 展开更多
关键词 big data content-centric networking caching policy mobility management routing strategy
下载PDF
基于二阶锥松弛和Big-M法的配电网分布式电源优化配置 被引量:49
4
作者 刘健辰 刘山林 《电网技术》 EI CSCD 北大核心 2018年第8期2604-2611,共8页
提出一种基于二阶锥松弛和Big-M法的配电网DG(distributed generation,DG)优化配置的有效方法。通过适当处理PQ、PV、PI和PQ(V)4种类型DG的并网潮流约束,精确计及DG的运行控制方式对优化配置的影响。利用二阶锥松弛方法,将交流潮流... 提出一种基于二阶锥松弛和Big-M法的配电网DG(distributed generation,DG)优化配置的有效方法。通过适当处理PQ、PV、PI和PQ(V)4种类型DG的并网潮流约束,精确计及DG的运行控制方式对优化配置的影响。利用二阶锥松弛方法,将交流潮流约束、ZIP负荷约束和PI、PQ(V)型DG并网潮流约束转化为二阶锥规划问题,并通过适当设置优化目标函数,保证松弛误差趋于零。为了解决DG优化配置中的混合整数非线性约束、PV型节点无功功率越限和无功补偿整数约束问题,利用Big-M方法将其转化为便于有效求解的混合整数二阶锥规划问题。通过多个测试场景表明,所提出的二阶锥松弛方法具有非常高的求解精度,而且具备求解多类型DG多区域优化配置问题的能力。并且发现,适当调整DG的功率因数可以显著降低系统损耗;采用多DG分散配置比单DG集中配置的降损效果更好;增加电压偏移质量优化目标后,可以使电压分布更加扁平,显著提高系统电压质量。采用IEEE-33节点和PG&E69节点配电系统的仿真结果验证了所提出方法的可行性和有效性。 展开更多
关键词 分布式电源 优化配置 二阶锥松弛法 big-M法 配电网
下载PDF
ARF鸟苷酸交换因子BIGs对高尔基体相关的囊泡转运的调控作用
5
作者 林思思 林巍 +3 位作者 王莹 周春 李翠限 沈晓燕 《中山大学学报(医学科学版)》 CAS CSCD 北大核心 2012年第3期311-315,共5页
【目的】探讨ARF鸟苷酸交换因子BIG1和BIG2在高尔基体相关囊泡转运方面的功能。【方法】利用脂质体将siRNA干扰序列转入细胞中,western blotting方法检测转染效率;利用细胞免疫荧光染色方法检测Hela细胞中BIGs蛋白水平的表达分布;采用Al... 【目的】探讨ARF鸟苷酸交换因子BIG1和BIG2在高尔基体相关囊泡转运方面的功能。【方法】利用脂质体将siRNA干扰序列转入细胞中,western blotting方法检测转染效率;利用细胞免疫荧光染色方法检测Hela细胞中BIGs蛋白水平的表达分布;采用Alexa568标记的转铁蛋白孵育Hela细胞,检测转铁蛋白相关的内吞体循环;利用脂质体转染VSVG-YFP病毒质粒,检测新生蛋白经从内质网经高尔基体转运至胞膜的途径。【结果】BIG1和BIG2的siRNA干扰效率均高于70%,且特异性良好;干扰掉BIGs后,细胞内TGN230结构变松散,呈现短片状或点状;干扰BIG2可导致细胞内转铁蛋白的积聚,而同时干扰BIG1则可进-步加剧转铁蛋白的积聚;BIG1或/和BIG2干扰均抑制了新生蛋白的从内质网向高尔基及细胞表面的转运过程。【结论】BIGs蛋白主要位于反面高尔基体网络,对维持其结构完整性非常重要;它们均参与调控高尔基体相关的囊泡转运,两者具有协同作用。 展开更多
关键词 RNAI bigs 反面高尔基体网络 囊泡转运 VSVG—YFP
下载PDF
Analysis of Malware Application Based on Massive Network Traffic 被引量:4
6
作者 Xiaolin Gui Jun Liu +2 位作者 Mucong Chi Chenyu Li Zhenming Lei 《China Communications》 SCIE CSCD 2016年第8期209-221,共13页
Security and privacy issues are magnified by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While XcodeGhost, a malware of i OS em... Security and privacy issues are magnified by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While XcodeGhost, a malware of i OS emerging in late 2015, leads to the privacy-leakage of a large number of users, only a few studies have examined XcodeGhost based on its source code. In this paper we describe observations by monitoring the network activities for more than 2.59 million i Phone users in a provincial area across 232 days. Our analysis reveals a number of interesting points. For example, we propose a decay model for the prevalence rate of Xcode Ghost and we find that the ratio of the infected devices is more than 60%; that a lot of popular applications, such as Wechat, railway 12306, didi taxi, Youku video are also infected; and that the duration as well as the traffic volume of most Xcode Ghost-related HTTP-requests is similar with usual HTTP-request which makes it difficult to be found. Besides, we propose a heuristic model based on fingerprint and its web-knowledge to identify the infected applications. The identifying result shows the efficiency of this model. 展开更多
关键词 Xcode Ghost big data network security applications identification
下载PDF
MapReduce Based Parallel Bayesian Network for Manufacturing Quality Control 被引量:4
7
作者 Mao-Kuan Zheng Xin-Guo Ming +1 位作者 Xian-Yu Zhang Guo-Ming Li 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第5期1216-1226,共11页
Increasing complexity of industrial products and manufacturing processes have challenged conventional statistics based quality management approaches in the cir- cumstances of dynamic production. A Bayesian network and... Increasing complexity of industrial products and manufacturing processes have challenged conventional statistics based quality management approaches in the cir- cumstances of dynamic production. A Bayesian network and big data analytics integrated approach for manufacturing process quality analysis and control is proposed. Based on Hadoop distributed architecture and MapReduce parallel computing model, big volume and variety quality related data generated during the manufacturing process could be dealt with. Artificial intelligent algorithms, including Bayesian network learning, classification and reasoning, are embedded into the Reduce process. Relying on the ability of the Bayesian network in dealing with dynamic and uncertain problem and the parallel computing power of MapReduce, Bayesian net- work of impact factors on quality are built based on prior probability distribution and modified with posterior probability distribution. A case study on hull segment manufacturing precision management for ship and offshore platform building shows that computing speed accelerates almost directly pro- portionally to the increase of computing nodes. It is also proved that the proposed model is feasible for locating and reasoning of root causes, forecasting of manufacturing outcome, and intelligent decision for precision problem solving. The inte- gration ofbigdata analytics and BN method offers a whole new perspective in manufacturing quality control. 展开更多
关键词 Bayesian network big data analytics MAPREDUCE Quality control
下载PDF
Decision Model of Knowledge Transfer in Big Data Environment 被引量:7
8
作者 Chuanrong Wu Yingwu Chen Feng Li 《China Communications》 SCIE CSCD 2016年第7期100-107,共8页
A decision model of knowledge transfer is presented on the basis of the characteristics of knowledge transfer in a big data environment.This model can determine the weight of knowledge transferred from another enterpr... A decision model of knowledge transfer is presented on the basis of the characteristics of knowledge transfer in a big data environment.This model can determine the weight of knowledge transferred from another enterprise or from a big data provider.Numerous simulation experiments are implemented to test the efficiency of the optimization model.Simulation experiment results show that when increasing the weight of knowledge from big data knowledge provider,the total discount expectation of profits will increase,and the transfer cost will be reduced.The calculated results are in accordance with the actual economic situation.The optimization model can provide useful decision support for enterprises in a big data environment. 展开更多
关键词 big data knowledge transfer optimization simulation dynamic network
下载PDF
基于大数据和无线网络的采摘机器人定位技术研究
9
作者 朱雯曦 《农机化研究》 北大核心 2025年第1期194-198,共5页
分析了5G无线网络定位原理,提出了单基站定位技术和加权质心的5G定位技术,设计了采摘机器人定位系统硬件部分,并基于大数据和无线网络实现了采摘机器人定位系统。试验结果表明:系统具有较好的定位精度,优于单基站定位方法精度,且其定位... 分析了5G无线网络定位原理,提出了单基站定位技术和加权质心的5G定位技术,设计了采摘机器人定位系统硬件部分,并基于大数据和无线网络实现了采摘机器人定位系统。试验结果表明:系统具有较好的定位精度,优于单基站定位方法精度,且其定位曲线与北斗定位设备曲线拟合度非常高,稳定性较好。 展开更多
关键词 采摘机器人 5G无线网络 定位 单基站 加权质心 大数据
下载PDF
Modeling and Mining the Temporal Patterns of Service in Cellular Network
10
作者 Sun Weijian Qin Xiaowei Wei Guo 《China Communications》 SCIE CSCD 2015年第9期11-21,共11页
Recent emergence of diverse services have led to explosive traffic growth in cellular data networks. Understanding the service dynamics in large cellular networks is important for network design, trouble shooting, qua... Recent emergence of diverse services have led to explosive traffic growth in cellular data networks. Understanding the service dynamics in large cellular networks is important for network design, trouble shooting, quality of service(Qo E) support, and resource allocation. In this paper, we present our study to reveal the distributions and temporal patterns of different services in cellular data network from two different perspectives, namely service request times and service duration. Our study is based on big traffic data, which is parsed to readable records by our Hadoop-based packet parsing platform, captured over a week-long period from a tier-1 mobile operator's network in China. We propose a Zipf's ranked model to characterize the distributions of traffic volume, packet, request times and duration of cellular services. Two-stage method(Self-Organizing Map combined with kmeans) is first used to cluster time series of service into four request patterns and three duration patterns. These seven patterns are combined together to better understand the fine-grained temporal patterns of service in cellular network. Results of our distribution models and temporal patterns present cellular network operators with a better understanding of the request and duration characteristics of service, which of great importance in network design, service generation and resource allocation. 展开更多
关键词 big data cellular network data mining hadoop SOM cluster service
下载PDF
PECS: Towards Personalized Edge Caching for Future Service-Centric Networks 被引量:4
11
作者 Ming Yan Wenwen Li +3 位作者 Chien Aun Chan Sen Bian Chih-Lin I André F. Gygax 《China Communications》 SCIE CSCD 2019年第8期93-106,共14页
Mobile operators face the challenge of how to best design a service-centric network that can effectively process the rapidly increasing number of bandwidth-intensive user requests while providing a higher quality of e... Mobile operators face the challenge of how to best design a service-centric network that can effectively process the rapidly increasing number of bandwidth-intensive user requests while providing a higher quality of experience(QoE). Existing content distribution networks(CDN) and mobile content distribution networks(mCDN) have both latency and throughput limitations due to being multiple network hops away from end-users. Here, we first propose a new Personalized Edge Caching System(PECS) architecture that employs big data analytics and mobile edge caching to provide personalized service access at the edge of the mobile network. Based on the proposed system architecture, the edge caching strategy based on user behavior and trajectory is analyzed. Employing our proposed PECS strategies, we use data mining algorithms to analyze the personalized trajectory and service usage patterns. Our findings provide guidance on how key technologies of PECS can be employed for current and future networks. Finally, we highlight the challenges associated with realizing such a system in 5G and beyond. 展开更多
关键词 big DATA DATA mining EDGE CACHING content network PERSONALIZED EDGE CACHING
下载PDF
The Roles of 5G Mobile Broadband in the Development of IoT, Big Data, Cloud and SDN 被引量:1
12
作者 Bao-Shuh Paul Lin Fuchun Joseph Lin Li-Ping Tung 《Communications and Network》 2016年第1期9-21,共13页
The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after a... The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after another and created strong interdependence among one another. For example, IoT applications that generate small data with large volume and fast velocity will need 5G with characteristics of high data rate and low latency to transmit such data faster and cheaper. On the other hand, those data also need Cloud to process and to store and furthermore, SDN to provide scalable network infrastructure to transport this large volume of data in an optimal way. This article explores the technical relationships among the development of IoT, Big Data, Cloud, and SDN in the coming 5G era and illustrates several ongoing programs and applications at National Chiao Tung University that are based on the converging of those technologies. 展开更多
关键词 5G Internet of Things (IoT) Software Defined networks (SDN) big Data Analytics Cloud Computing
下载PDF
Motor Fault Diagnosis Based on Short-time Fourier Transform and Convolutional Neural Network 被引量:41
13
作者 Li-Hua Wang Xiao-Ping Zhao +2 位作者 Jia-Xin Wu Yang-Yang Xie Yong-Hong Zhang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第6期1357-1368,共12页
With the rapid development of mechanical equipment, the mechanical health monitoring field has entered the era of big data. However, the method of manual feature extraction has the disadvantages of low efficiency and ... With the rapid development of mechanical equipment, the mechanical health monitoring field has entered the era of big data. However, the method of manual feature extraction has the disadvantages of low efficiency and poor accuracy, when handling big data. In this study, the research object was the asynchronous motor in the drivetrain diagnostics simulator system. The vibration signals of different fault motors were collected. The raw signal was pretreated using short time Fourier transform (STFT) to obtain the corresponding time-frequency map. Then, the feature of the time-frequency map was adap- tively extracted by using a convolutional neural network (CNN). The effects of the pretreatment method, and the hyper parameters of network diagnostic accuracy, were investigated experimentally. The experimental results showed that the influence of the preprocessing method is small, and that the batch-size is the main factor affecting accuracy and training efficiency. By investigating feature visualization, it was shown that, in the case of big data, the extracted CNN features can represent complex mapping relationships between signal and health status, and can also overcome the prior knowledge and engineering experience requirement for feature extraction, which is used by tra- ditional diagnosis methods. This paper proposes a new method, based on STFT and CNN, which can complete motor fault diagnosis tasks more intelligently and accurately. 展开更多
关键词 big data Deep learning Short-time Fouriertransform Convolutional neural network MOTOR
下载PDF
Efficient Bayesian networks for slope safety evaluation with large quantity monitoring information 被引量:8
14
作者 Xueyou Li Limin Zhang Shuai Zhang 《Geoscience Frontiers》 SCIE CAS CSCD 2018年第6期1679-1687,共9页
New sensing and wireless technologies generate massive data. This paper proposes an efficient Bayesian network to evaluate the slope safety using large-quantity field monitoring information with underlying physical me... New sensing and wireless technologies generate massive data. This paper proposes an efficient Bayesian network to evaluate the slope safety using large-quantity field monitoring information with underlying physical mechanisms. A Bayesian network for a slope involving correlated material properties and dozens of observational points is constructed. 展开更多
关键词 SLOPE reliability Monitoring INFORMATION BAYESIAN networks RISK management VALUE of INFORMATION big data
下载PDF
Exploring the Big Data Using a Rigorous and Quantitative Causality Analysis 被引量:3
15
作者 X. San Liang 《Journal of Computer and Communications》 2016年第5期53-59,共7页
Causal analysis is a powerful tool to unravel the data complexity and hence provide clues to achieving, say, better platform design, efficient interoperability and service management, etc. Data science will surely ben... Causal analysis is a powerful tool to unravel the data complexity and hence provide clues to achieving, say, better platform design, efficient interoperability and service management, etc. Data science will surely benefit from the advancement in this field. Here we introduce into this community a recent finding in physics on causality and the subsequent rigorous and quantitative causality analysis. The resulting formula is concise in form, involving only the common statistics namely sample covariance. A corollary is that causation implies correlation, but not vice versa, resolving the long-standing philosophical debate over correlation versus causation. The applicability to big data analysis is validated with time series purportedly generated with hidden processes. As a demonstration, a preliminary application to the gross domestic product (GDP) data of United States, China, and Japan reveals some subtle USA-China-Japan relations in certain periods.   展开更多
关键词 CAUSALITY big Data Information Flow Time Series Causal network
下载PDF
E-Healthcare Supported by Big Data
16
作者 Jianqi Liu Jiafu Wan +1 位作者 Shenghua He Yanlin Zhang 《ZTE Communications》 2014年第3期46-52,共7页
The era of open information in healthcare has arrived. E-healthcare supported by big data supports the move toward greater trans-parency in healthcare by making decades of stored health data searchable and usable. Thi... The era of open information in healthcare has arrived. E-healthcare supported by big data supports the move toward greater trans-parency in healthcare by making decades of stored health data searchable and usable. This paper gives an overview the e-health-care architecture. We discuss the four layers of the architecture-data collection, data transport, data storage, and data analysis-as well as the challenges of data security, data privacy, real-time delivery, and open standard interface. We discuss the necessity of establishing an impeccably secure access mechanism and of enacting strong laws to protect patient privacy. 展开更多
关键词 healthcare wireless body network big data disease prediction remote monitoring medical data
下载PDF
Internet of Vehicles in Big Data Era 被引量:22
17
作者 Wenchao Xu Haibo Zhou +4 位作者 Nan Cheng Feng Lyu Weisen Shi Jiayin Chen Xuemin (Sherman) Shen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期19-35,共17页
As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding enviro... As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding environment. By significantly expanding the network scale and conducting both real-time and long-term information processing, the traditional Vehicular AdHoc Networks(VANETs) are evolving to the Internet of Vehicles(Io V), which promises efficient and intelligent prospect for the future transportation system. On the other hand, vehicles are not only consuming but also generating a huge amount and enormous types of data, which is referred to as Big Data. In this article, we first investigate the relationship between Io V and big data in vehicular environment, mainly on how Io V supports the transmission, storage, computing of the big data, and how Io V benefits from big data in terms of Io V characterization,performance evaluation and big data assisted communication protocol design. We then investigate the application of Io V big data in autonomous vehicles. Finally, the emerging issues of the big data enabled Io V are discussed. 展开更多
关键词 Autonomous vehicles big data big data applications data communication IoV vehicular networks
下载PDF
基于大数据聚类的通信网络安全态势预测技术 被引量:6
18
作者 陈功平 王红 《淮阴师范学院学报(自然科学版)》 CAS 2024年第1期20-26,共7页
传统通信网络安全态势预测技术缺乏大数据支撑,难以对发生的攻击进行详细分类和追踪,导致在进行长时间的态势预测中收敛过慢,准确度降低.提出一种基于大数据聚类的通信网络安全态势预测技术.分析通信网络的属性以及特点,选择安全态势描... 传统通信网络安全态势预测技术缺乏大数据支撑,难以对发生的攻击进行详细分类和追踪,导致在进行长时间的态势预测中收敛过慢,准确度降低.提出一种基于大数据聚类的通信网络安全态势预测技术.分析通信网络的属性以及特点,选择安全态势描述一级指标,将数据标准化处理之后,细分出二级指标;优化大数据聚类算法,计算最优聚类数量、确定聚类中心,建立关联规则库并优化预测流程,完成基于大数据聚类的通信网络安全态势预测技术的设计.通过实验结果表明,与两种传统的安全态势预测技术相比,设计的技术收敛速度更快,全体数据点没有出现残差扩散的现象,并且数据完整度较高. 展开更多
关键词 大数据聚类 通信网络 安全态势 描述指标 聚类优化 收敛速度
下载PDF
Artificial Intelligence Self-Organising (AI-SON) Frameworks for 5G-Enabled Networks: A Review
19
作者 Delali Kwasi Dake 《Journal of Computer and Communications》 2023年第4期33-62,共30页
The fifth generation (5G) networks will support the rapid emergence of Internet of Things (IoT) devices operating in a heterogeneous network (HetNet) system. These 5G-enabled IoT devices will result in a surge in data... The fifth generation (5G) networks will support the rapid emergence of Internet of Things (IoT) devices operating in a heterogeneous network (HetNet) system. These 5G-enabled IoT devices will result in a surge in data traffic for Mobile Network Operators (MNOs) to handle. At the same time, MNOs are preparing for a paradigm shift to decouple the control and forwarding plane in a Software-Defined Networking (SDN) architecture. Artificial Intelligence powered Self-Organising Networks (AI-SON) can fit into the SDN architecture by providing prediction and recommender systems to minimise costs in supporting the MNO’s infrastructure. This paper presents a review report on AI-SON frameworks in 5G and SDN. The review considers the dynamic deployment and functions of the AI-SON frameworks, especially for SDN support and applications. Each module in the frameworks was discussed to ascertain its relevance based on the context of AI-SON and SDN integration. After examining each framework, the identified gaps are summarised as open issues for future works. 展开更多
关键词 Self-Organising networks Artificial Intelligence Software-Defined networks 5G networks big Data
下载PDF
面向大数据的BiGAN网络入侵检测 被引量:1
20
作者 李洋 《太原师范学院学报(自然科学版)》 2019年第1期63-66,共4页
针对大数据背景下的网络入侵具有大规模、速度快和入侵变种的特点,提出了一种面向大数据的BiGAN网络入侵检测的方法.通过双向GAN(BiGAN)与潜伏网络的协同机制,有效地提高了检测效率和容灾能力.最后通过实验验证分析,结果表明提出的模型... 针对大数据背景下的网络入侵具有大规模、速度快和入侵变种的特点,提出了一种面向大数据的BiGAN网络入侵检测的方法.通过双向GAN(BiGAN)与潜伏网络的协同机制,有效地提高了检测效率和容灾能力.最后通过实验验证分析,结果表明提出的模型优于OC-SVM,IF,GAN等方法,低误报率、高准确率、高效率,是一种较为可行且有效的网络入侵检测方法. 展开更多
关键词 大数据 入侵检测 bigAN 潜伏网络 协同机制
下载PDF
上一页 1 2 181 下一页 到第
使用帮助 返回顶部