Home > Network Security and Communication Engineering: Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014), Hong Kong, December 25�26, 2014
Network Security and Communication Engineering: Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014), Hong Kong, December 25�26, 2014
Book Informaton
Access Options
Citation Options
Download CitationShowing 1 to 20 of 161 entries
Chapters/Headings | Author(s) | Pages | Info |
17-18 | |||
19-22 | |||
23-26 | |||
27-30 | |||
31-34 | |||
35-40 | |||
41-46 | |||
47-54 | |||
55-60 | |||
61-63 | |||
3. 2 Optimization Algorithm to cluster the network network’s optimization by genetic algorithms, we intrusion data combine them with FCM algorithm to deal with Intrusion detection cluster uses FCM and BP which intrusion data, making the ability of processing the optimized with GA. The flowchart of the process is Network intrusion data significantly improved. And shown in. we have improved the accuracy and stability of the | 64-64 | ||
65-70 | |||
71-74 | |||
75-80 | |||
81-84 | |||
85-90 | |||
91-94 | |||
95-102 | |||
103-108 | |||
109-112 | |||
Chapters/Headings | Author(s) | Pages | Info |
Showing 1 to 20 of 161 entries