期刊文献+
共找到3,793篇文章
< 1 2 190 >
每页显示 20 50 100
An Unknown Trojan Detection Method Based on Software Network Behavior 被引量:2
1
作者 LIANG Yu PENG Guojun +1 位作者 ZHANG Huanguo WANG Ying 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期369-376,共8页
Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) atta... Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) attack intents: besides dealing with damaging or destroying facilities, the more essential purpose of APT attacks is to gather confidential data from target hosts by planting Trojans. Inspired by this idea and some in-depth analyses on recently happened APT attacks, five typical communication characteristics are adopted to describe application’s network behavior, with which a fine-grained classifier based on Decision Tree and Na ve Bayes is modeled. Finally, with the training of supervised machine learning approaches, the classification detection method is implemented. Compared with general methods, this method is capable of enhancing the detection and awareness capability of unknown Trojans with less resource consumption. 展开更多
关键词 targeted attack unknown Trojan detection software network behavior machine learning
原文传递
Trust evolvement method of Web service combination based on network behavior
2
作者 刘济波 向占宏 朱培栋 《Journal of Central South University of Technology》 EI 2008年第4期558-563,共6页
Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the met... Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the method,the control rule of the trust degree in the Dempster-Shafer(D-S)rule was utilized based on the entity network interactive behavior,and a proportion trust control rule was put up.The control rule could make the Web service self-adaptively study so as to gradually form a proper trust connection with its cooperative entities and to improve the security performance of the whole system.The experimental results show that the historical successful experience is saved during the service combination alliance,and the method can greatly improve the reliability and success rate of Web service combination. 展开更多
关键词 network behavior Web service combination trust evolvement Dempster-Shafer rule
在线阅读 下载PDF
Research on College Frustrated Students' Network Mentality and Behaviors
3
作者 Zichen YIN 《International Journal of Technology Management》 2015年第4期6-8,共3页
Network has not only become a habit and lifestyle for university student, but also brought all sorts of ethical misconducts and ethical issues in society. Based on the analysis of college students' frustrations, this... Network has not only become a habit and lifestyle for university student, but also brought all sorts of ethical misconducts and ethical issues in society. Based on the analysis of college students' frustrations, this paper explores the causes of network behavior anomie for college students, which mainly include: dissatisfaction in real communication, game addiction to the network, craving online pornography, and hooking on online shopping. In addition, it also investigates the ways to wipe out mental frustration in such a cyber era. These ways mainly are to strenzthen online education and management, to make psychological counseling, and to carry on frustration education. 展开更多
关键词 college students network behaviors causes of network behavior anomie ways to overcome mental frustration
在线阅读 下载PDF
Efficient Feature Extraction Using Apache Spark for Network Behavior Anomaly Detection 被引量:2
4
作者 Xiaoming Ye Xingshu Chen +4 位作者 Dunhu Liu Wenxian Wang Li Yang Gang Liang Guolin Shao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第5期561-573,共13页
Extracting and analyzing network traffic feature is fundamental in the design and implementation of network behavior anomaly detection methods. The traditional network traffic feature method focuses on the statistical... Extracting and analyzing network traffic feature is fundamental in the design and implementation of network behavior anomaly detection methods. The traditional network traffic feature method focuses on the statistical features of traffic volume. However, this approach is not sufficient to reflect the communication pattern features. A different approach is required to detect anomalous behaviors that do not exhibit traffic volume changes, such as low-intensity anomalous behaviors caused by Denial of Service/Distributed Denial of Service (DoS/DDoS) attacks, Internet worms and scanning, and BotNets. We propose an efficient traffic feature extraction architecture based on our proposed approach, which combines the benefit of traffic volume features and network communication pattern features. This method can detect low-intensity anomalous network behaviors and conventional traffic volume anomalies. We implemented our approach on Spark Streaming and validated our feature set using labelled real-world dataset collected from the Sichuan University campus network. Our results demonstrate that the traffic feature extraction approach is efficient in detecting both traffic variations and communication structure changes. Based on our evaluation of the MIT-DRAPA dataset, the same detection approach utilizes traffic volume features with detection precision of 82.3% and communication pattern features with detection precision of 89.9%. Our proposed feature set improves precision by 94%. 展开更多
关键词 feature extraction graph theory network behavior anomaly detection Apache Spark
原文传递
Research on behavior recognition algorithm based on SE-I3D-GRU network 被引量:4
5
作者 Wu Jin Yang Xue +1 位作者 Xi Meng Wan Xianghong 《High Technology Letters》 EI CAS 2021年第2期163-172,共10页
In order to effectively solve the problems of low accuracy and large amount of calculation of current human behavior recognition,a behavior recognition algorithm based on squeeze-and-excitation network(SENet) combined... In order to effectively solve the problems of low accuracy and large amount of calculation of current human behavior recognition,a behavior recognition algorithm based on squeeze-and-excitation network(SENet) combined with 3 D Inception network(I3 D) and gated recurrent unit(GRU) network is proposed.The algorithm first expands the Inception module to three-dimensional,and builds a network based on the three-dimensional module,and expands SENet to three-dimensional,making it an attention mechanism that can pay attention to the three-dimensional channel.Then SENet is introduced into the 13 D network,named SE-I3 D,and SENet is introduced into the CRU network,named SE-GRU.And,SE-13 D and SE-GRU are merged,named SE-13 D-GRU.Finally,the network uses Softmax to classify the results in the UCF-101 dataset.The experimental results show that the SE-I3 D-GRU network achieves a recognition rate of 93.2% on the UCF-101 dataset. 展开更多
关键词 behavior recognition squeeze-and-excitation network(SENet) Incepton network gated recurrent unit(GRU)
在线阅读 下载PDF
Calculation of the Behavior Utility of a Network System: Conception and Principle 被引量:5
6
作者 Changzhen Hu 《Engineering》 2018年第1期78-84,共7页
The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison, This paper describes sce- nes o... The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison, This paper describes sce- nes of network behavior as differential manifolds, Using the homeomorphic transformation of smooth differential manifolds, we provide a mathematical definition of network behavior and propose a mathe- matical description of the network behavior path and behavior utility, Based on the principle of differen- tial geometry, this paper puts forward the function of network behavior and a calculation method to determine behavior utility, and establishes the calculation principle of network behavior utility, We also provide a calculation framework for assessment of the network's attack-defense confrontation on the strength of behavior utility, Therefore, this paper establishes a mathematical foundation for the objective measurement and precise evaluation of network behavior, 展开更多
关键词 network metric evaluation Differential MANIFOLD network behavior UTILITY network attack-defense CONFRONTATION
在线阅读 下载PDF
Constitutive modeling of compression behavior of TC4 tube based on modified Arrhenius and artificial neural network models 被引量:5
7
作者 Zhi-Jun Tao He Yang +2 位作者 Heng Li Jun Ma Peng-Fei Gao 《Rare Metals》 SCIE EI CAS CSCD 2016年第2期162-171,共10页
Warm rotary draw bending provides a feasible method to form the large-diameter thin-walled(LDTW)TC4 bent tubes, which are widely used in the pneumatic system of aircrafts. An accurate prediction of flow behavior of ... Warm rotary draw bending provides a feasible method to form the large-diameter thin-walled(LDTW)TC4 bent tubes, which are widely used in the pneumatic system of aircrafts. An accurate prediction of flow behavior of TC4 tubes considering the couple effects of temperature,strain rate and strain is critical for understanding the deformation behavior of metals and optimizing the processing parameters in warm rotary draw bending of TC4 tubes. In this study, isothermal compression tests of TC4 tube alloy were performed from 573 to 873 K with an interval of 100 K and strain rates of 0.001, 0.010 and0.100 s^(-1). The prediction of flow behavior was done using two constitutive models, namely modified Arrhenius model and artificial neural network(ANN) model. The predictions of these constitutive models were compared using statistical measures like correlation coefficient(R), average absolute relative error(AARE) and its variation with the deformation parameters(temperature, strain rate and strain). Analysis of statistical measures reveals that the two models show high predicted accuracy in terms of R and AARE. Comparatively speaking, the ANN model presents higher predicted accuracy than the modified Arrhenius model. In addition, the predicted accuracy of ANN model presents high stability at the whole deformation parameter ranges, whereas the predictability of the modified Arrhenius model has some fluctuation at different deformation conditions. It presents higher predicted accuracy at temperatures of 573-773 K, strain rates of 0.010-0.100 s^(-1)and strain of 0.04-0.32, while low accuracy at temperature of 873 K, strain rates of 0.001 s^(-1)and strain of 0.36-0.48.Thus, the application of modified Arrhenius model is limited by its relatively low predicted accuracy at some deformation conditions, while the ANN model presents very high predicted accuracy at all deformation conditions,which can be used to study the compression behavior of TC4 tube at the temperature range of 573-873 K and the strain rate of 0.001-0.100 s^(-1). It can provide guideline for the design of processing parameters in warm rotary draw bending of LDTW TC4 tubes. 展开更多
关键词 TC4 tube Compression behavior Constitutive model Modified Arrhenius model Neural network model
原文传递
The Research on E-mail Users' Behavior of Participating in Subjects Based on Social Network Analysis 被引量:3
8
作者 ZHANG Lejun ZHOU Tongxin +2 位作者 Qi Zhixin GUO Lin XU Li 《China Communications》 SCIE CSCD 2016年第4期70-80,共11页
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in... The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition. 展开更多
关键词 E-MAIL network social network ANALYSIS user behavior ANALYSIS KEYWORD selection
在线阅读 下载PDF
Container Networking Performance Analysis for Large-Scale User Behavior Simulation 被引量:1
9
作者 Yifang Ji Guomin Zhang +1 位作者 Shengxu Xie Xiulei Wang 《Journal of Computer and Communications》 2019年第10期136-146,共11页
Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-... Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-scale users under the constraints of limited physical resources. In a container-based virtualization environment, container networking is an important component. To evaluate the impact of different networking methods between the containers on the simulation performance, the typical container networking methods such as none, bridge, macvlan were analyzed, and the performance of different networking methods was evaluated according to the throughput and latency metrics. The experiments show that under the same physical resource constraints, the macvlan networking method has the best network performance, while the bridge method has the worst performance. This result provides a reference for selecting the appropriate networking method in the user behavior simulation process. 展开更多
关键词 Linux CONTAINER networkING Mode network Performance USER behavior SIMULATION
在线阅读 下载PDF
Deep Neural Network Based Behavioral Model of Nonlinear Circuits
10
作者 Zhe Jin Sekouba Kaba 《Journal of Applied Mathematics and Physics》 2021年第3期403-412,共10页
With the rapid growth of complexity and functionality of modern electronic systems, creating precise behavioral models of nonlinear circuits has become an attractive topic. Deep neural networks (DNNs) have been recogn... With the rapid growth of complexity and functionality of modern electronic systems, creating precise behavioral models of nonlinear circuits has become an attractive topic. Deep neural networks (DNNs) have been recognized as a powerful tool for nonlinear system modeling. To characterize the behavior of nonlinear circuits, a DNN based modeling approach is proposed in this paper. The procedure is illustrated by modeling a power amplifier (PA), which is a typical nonlinear circuit in electronic systems. The PA model is constructed based on a feedforward neural network with three hidden layers, and then Multisim circuit simulator is applied to generating the raw training data. Training and validation are carried out in Tensorflow deep learning framework. Compared with the commonly used polynomial model, the proposed DNN model exhibits a faster convergence rate and improves the mean squared error by 13 dB. The results demonstrate that the proposed DNN model can accurately depict the input-output characteristics of nonlinear circuits in both training and validation data sets. 展开更多
关键词 Nonlinear Circuits Deep Neural networks behavioral Model Power Amplifier
在线阅读 下载PDF
Empirical Study on Influence of Brand Crisis of Agricultural Products on Network Cluster Behavior of Consumers
11
作者 Chong GONG 《Asian Agricultural Research》 2016年第6期1-4,8,共5页
From the perspective of psychological contract,this paper discusses mechanism of consumers' network cluster behavior in the context of brand crisis. On the basis of Simmel's conflict theory,it presented new fi... From the perspective of psychological contract,this paper discusses mechanism of consumers' network cluster behavior in the context of brand crisis. On the basis of Simmel's conflict theory,it presented new findings of network cluster behavior. It is concluded that brand crisis exerts significant influence on breach of psychological contract. Particularly,functional brand crisis more easily leads to breach of transactional psychological contract,while value brand crisis more easily leads to breach of relational psychological contract. Breach of transactional psychological contract more easily leads to realistic network cluster behavior,while breach of relational psychological contract does not necessarily lead to non-realistic network cluster behavior. 展开更多
关键词 BRAND crisis network cluster behavior Breach of PSYCHOLOGICAL contract
在线阅读 下载PDF
A Co-Evolution Model for Dynamic Social Network and Behavior
12
作者 Liping Tong David Shoham Richard S. Cooper 《Open Journal of Statistics》 2014年第9期765-775,共11页
Individual behaviors, such as drinking, smoking, screen time, and physical activity, can be strongly influenced by the behavior of friends. At the same time, the choice of friends can be influenced by shared behaviora... Individual behaviors, such as drinking, smoking, screen time, and physical activity, can be strongly influenced by the behavior of friends. At the same time, the choice of friends can be influenced by shared behavioral preferences. The actor-based stochastic models (ABSM) are developed to study the interdependence of social networks and behavior. These methods are efficient and useful for analysis of discrete behaviors, such as drinking and smoking;however, since the behavior evolution function is in an exponential format, the ABSM can generate inconsistent and unrealistic results when the behavior variable is continuous or has a large range, such as hours of television watched or body mass index. To more realistically model continuous behavior variables, we propose a co-evolution process based on a linear model which is consistent over time and has an intuitive interpretation. In the simulation study, we applied the expectation maximization (EM) and Markov chain Monte Carlo (MCMC) algorithms to find the maximum likelihood estimate (MLE) of parameter values. Additionally, we show that our assumptions are reasonable using data from the National Longitudinal Study of Adolescent Health (Add Health). 展开更多
关键词 SOCIAL network SOCIAL behavior CO-EVOLUTION MARKOV CHAIN STATIONARY Distribution
暂未订购
Golay Code Clustering for Mobility Behavior Similarity Classification in Pocket Switched Networks
13
作者 Hongjun YU Tao Jing +1 位作者 Dechang Chen Simon Y. Berkovich 《通讯和计算机(中英文版)》 2012年第4期466-472,共7页
关键词 流动行为 交换网络 相似性 分类代码 聚类 端到端时延 口袋 路由协议
在线阅读 下载PDF
LONG-TIME BEHAVIOR OF TRANSIENT SOLUTIONS FOR CELLULAR NEURAL NETWORK SYSTEMS
14
作者 蒋耀林 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2000年第3期321-326,共6页
By establishing concept an transient solutions of general nonlinear systems converging to its equilibrium set, long-time behavior of solutions for cellular neural network systems is studied. A stability condition in g... By establishing concept an transient solutions of general nonlinear systems converging to its equilibrium set, long-time behavior of solutions for cellular neural network systems is studied. A stability condition in generalized sense is obtained. This result reported has an important guide to concrete neural network designs. 展开更多
关键词 dynamic stability cellular neural network systems long-time behavior of transient solutions
在线阅读 下载PDF
Analog-Circuit Model of FGH96 Superalloy Hot Deformation Behaviors Based on Artificial Neural Network
15
作者 刘玉红 李付国 +1 位作者 李超 吴诗 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2005年第1期90-96,共7页
At the present time, numerical models (such as, numerical simulation based on FEM) adopted broadly in technological design and process control in forging field can not implement the realtime control of material form... At the present time, numerical models (such as, numerical simulation based on FEM) adopted broadly in technological design and process control in forging field can not implement the realtime control of material forming process. It is thus necessary to establish a dynamic model fitting for the real-time control of material deformation processing in order to increase production efficiency, improve forging qualities and increase yields. In this paper, hot deformation behaviors of FGH96 superalloy are characterized by using hot compressive simulation experiments. The artificial neural network (ANN) model of FGH96 superalloy during hot deformation is established by using back propagation (BP) network. Then according to electrical analogy theory, its analog-circuit (AC) model is obtained through mapping the ANN model into analog circuit. Testing results show that the ANN model and the AC model of FGH96 superalloy hot deformation behaviors possess high predictive precisions and can well describe the superalloy's dynamic flow behaviors. The ideas proposed in this paper can be applied in the real-time control of material deformation processing. 展开更多
关键词 FGH96 superalloy flow behavior artificial neural network(ANN) analog-circuit
在线阅读 下载PDF
基于人工神经网络预测锂离子软包电池充放电行为研究
16
作者 刘宁 孙海波 《微纳电子技术》 2026年第1期94-103,共10页
基于人工神经网络(ANN)技术对钴酸锂/镍钴酸锂软包电池不同循环次数下的充放电曲线进行了预测,研究了隐含层数量、隐含层神经元个数、传递函数类型及优化算法对充放电曲线预测精度的调控作用。结果表明,采用单隐含层的ANN模型可实现充... 基于人工神经网络(ANN)技术对钴酸锂/镍钴酸锂软包电池不同循环次数下的充放电曲线进行了预测,研究了隐含层数量、隐含层神经元个数、传递函数类型及优化算法对充放电曲线预测精度的调控作用。结果表明,采用单隐含层的ANN模型可实现充放电曲线的高精度预测。预测充电行为时,最优的网络结构为2-47-1,隐含层和输出层传递函数分别为logsig和purelin,优化算法选用trainbr,预测值与实验值的均方误差(MSE)最低为2.43×10^(-7);预测放电行为时,最优的网络结构为2-69-1,隐含层与输出层传递函数分别为tansig和purelin,优化算法仍为trainbr,MSE最低为1.41×10^(-6)。基于电池1数据优化的模型可有效预测电池2的充放电行为,MSE稳定在10^(-5)数量级;当循环次数增至7000次时,MSE升至10^(-2)~10^(-3)数量级,这是由于模型未能充分表征电池老化过程中的电化学特征。此外,该ANN模型在训练、验证和测试数据集上的回归系数(R2)均超过0.99,展现出优异的预测精度与泛化能力。 展开更多
关键词 锂离子电池 软包电池 充放电曲线 人工神经网络(ANN) 电化学行为预测
原文传递
Semi-Supervised Learning Based Big Data-Driven Anomaly Detection in Mobile Wireless Networks 被引量:6
17
作者 Bilal Hussain Qinghe Du Pinyi Ren 《China Communications》 SCIE CSCD 2018年第4期41-57,共17页
With rising capacity demand in mobile networks, the infrastructure is also becoming increasingly denser and complex. This results in collection of larger amount of raw data(big data) that is generated at different lev... With rising capacity demand in mobile networks, the infrastructure is also becoming increasingly denser and complex. This results in collection of larger amount of raw data(big data) that is generated at different levels of network architecture and is typically underutilized. To unleash its full value, innovative machine learning algorithms need to be utilized in order to extract valuable insights which can be used for improving the overall network's performance. Additionally, a major challenge for network operators is to cope up with increasing number of complete(or partial) cell outages and to simultaneously reduce operational expenditure. This paper contributes towards the aforementioned problems by exploiting big data generated from the core network of 4 G LTE-A to detect network's anomalous behavior. We present a semi-supervised statistical-based anomaly detection technique to identify in time: first, unusually low user activity region depicting sleeping cell, which is a special case of cell outage; and second, unusually high user traffic area corresponding to a situation where special action such as additional resource allocation, fault avoidance solution etc. may be needed. Achieved results demonstrate that the proposed method can be used for timely and reliable anomaly detection in current and future cellular networks. 展开更多
关键词 5G 4G LTE-A anomaly detec-tion call detail record machine learning bigdata analytics network behavior analysis sleeping cell
在线阅读 下载PDF
中国水资源行为的碳排放空间关联网络结构
18
作者 李宝珠 吴雪丽 《环境科学》 北大核心 2026年第1期75-89,共15页
在国家“双碳”目标下,全面洞悉水资源领域碳排放量的现状及特征至关重要.为探究中国不同水资源行为碳排放量的空间关联网络结构特征,以2022年全国30个省域为研究样本,从水资源开发、配置、利用和保护这4种行为的角度,对各省域碳排放量... 在国家“双碳”目标下,全面洞悉水资源领域碳排放量的现状及特征至关重要.为探究中国不同水资源行为碳排放量的空间关联网络结构特征,以2022年全国30个省域为研究样本,从水资源开发、配置、利用和保护这4种行为的角度,对各省域碳排放量进行计算,并采用修正后的引力模型构建空间矩阵,结合社会网络分析法剖析其空间关联网络特征.结果表明:(1)水资源开发、配置和利用行为下呈现出东南地区碳排放量的值较大,水资源保护行为下整体碳排放量为负值且东南地区相对较小.(2)水资源利用行为的碳排放网络的紧密程度和稳定程度在4种行为中最高;水资源配置网络中各地区的依赖性最低,等级制度和不平等程度较小.(3)上海、江苏、北京、福建和浙江在4种行为网络中都处于中心位置.(4)中国不同水资源行为下碳排放量的块模型划分结构较为明显,各板块关联关系较多. 展开更多
关键词 水资源行为 碳排放量 空间关联网络 引力模型 社会网络分析法
原文传递
基于场景行为与变化关联的工控网络异常检测模型
19
作者 罗兼慧 吴承荣 《计算机应用与软件》 北大核心 2026年第1期362-369,376,共9页
为了发现工控网络中不改变网络连接配置,只篡改应用层负载中的指令和参数的应用层攻击,并提高异常检测可解释性,提出一种基于工控网络中主要场景的行为与状态理解的网络异常检测模型。该模型通过划分工业场景,定义工艺参数变化行为并发... 为了发现工控网络中不改变网络连接配置,只篡改应用层负载中的指令和参数的应用层攻击,并提高异常检测可解释性,提出一种基于工控网络中主要场景的行为与状态理解的网络异常检测模型。该模型通过划分工业场景,定义工艺参数变化行为并发现之间的关联性来理解运行状态,即从不同场景的变化逻辑中抽取参数关联关系。并通过与当前工艺参数具有相关关系的参数和时间序列模块预测其行为状态,发现不符合正常运行状态的异常行为状态。实验在各种实际的工控网络场景中验证了该方法具备较高的异常检测准确率。 展开更多
关键词 工控网络 场景区分 行为关联 状态预测 异常检测
在线阅读 下载PDF
上一页 1 2 190 下一页 到第
使用帮助 返回顶部