四川大学计算机学院 梁刚,梁刚(四川大学网络空间安全学院副教授)_百度百科...

Liang Gang,Rumor Identification in Microblogging Systems Based on Users' Behavior. IEEE Trans. Comput. Social Systems 2(3): 99-108 (2015)

Yang, J., Liu, X., Li, T., Liang, G., & Liu, S. (2009). Distributed agents model for intrusion detection based on AIS. Knowledge-based systems, 22(2), 115-119.

Gong, X., Li, T., Wang, T., Yang, J., Liu, S., & Liang, G. (2006). An immune mobile agent based grid intrusion detection model. In Simulated Evolution and Learning (pp. 112-119). Springer Berlin Heidelberg.

Liu, S., Li, T., Wang, D., Zhao, K., Gong, X., Hu, X., ... & Liang, G. (2006). Immune multi-agent active defense model for network intrusion. In Simulated Evolution and Learning (pp. 104-111). Springer Berlin Heidelberg.

Yang, J., Li, T., Liu, S., Wang, T., Wang, D., & Liang, G. (2007). Computer Forensics System Based on Artificial Immune Systems. J. UCS, 13(9), 1354-1365.

Li, Q., Li, Z., Liang, G., Zhang, J. Y., Chen, L. Y., & Li, B. (2007, August). IDGSC: An Immunity-Based Approach for Dynamic Grid Service Classification. In Fuzzy Systems and Knowledge Discovery, 2007. FSKD 2007. Fourth International Conference on (Vol. 2, pp. 160-165). IEEE.

Gong X, Li T, Liang G, et al. Immunity and mobile agent based grid intrusion detection[M]//Computational Intelligence and Bioinformatics. Springer Berlin Heidelberg, 2006: 651-659.

Liang, G., Li, T., Ni, J., Jiang, Y., Yang, J., & Gong, X. (2006). An immunity-based dynamic multilayer intrusion detection system. In Computational Intelligence and Bioinformatics (pp. 641-650). Springer Berlin Heidelberg.

Yang, J., Li, T., Liu, S. J., & Liang, G. (2007, November). A Novel Network Security Evaluation System Based on Immune Principle. In Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on(pp. 484-489). IEEE.

Juan, L., Tao, L., & Gang, L. (2009, May). A Network Security Dynamic Situation Forecasting Method. In Information Technology and Applications, 2009. IFITA'09. International Forum on (Vol. 1, pp. 115-118). IEEE.

Gong, X., Li, T., Lu, J., Wang, T., Liang, G., Yang, J., & Sun, F. (2006). Immunity and mobile agent based intrusion detection for grid. In Agent Computing and Multi-Agent Systems (pp. 187-198). Springer Berlin Heidelberg.

Gong, X., Li, T., Wang, T., Yang, J., Liang, G., & Hu, X. (2006). Grid intrusion detection based on immune agent. In Advances in Natural Computation (pp. 73-82). Springer Berlin Heidelberg.

Wang, D. G., Li, T., Liu, S. J., Liang, G., & Zhao, K. (2008). An immune multi-agent system for network intrusion detection. In Advances in Computation and Intelligence (pp. 436-445). Springer Berlin Heidelberg.

Liang, G., Li, T., Gong, X., Jiang, Y., Yang, J., & Ni, J. (2006). NASC: a novel approach for spam classification. In Computational Intelligence and Bioinformatics (pp. 672-681). Springer Berlin Heidelberg.

Wan, Z., Liang, G., & Li, T. (2012). Multi-core processors based network intrusion detection method. Journal of Networks, 7(9), 1327-1333.

Liang G, He W, Xu C, et al. Rumor Identification in Microblogging Systems Based on Users’ Behavior[J]. IEEE Transactions on Computational Social Systems, 2015, 2(3): 99-108.

Wan Z, Liu X, Liang G. A Pipeline Model Based Intrusion Protection Method[C]//Proceedings of the 2012 Second International Conference on Electric Information and Control Engineering-Volume 01. IEEE Computer Society, 2012: 174-177.

Ziqian, W., Tao, L., & Gang, L. (2009, September). A Prediction Method of Network Security Situation. In Management and Service Science, 2009. MASS'09. International Conference on (pp. 1-4). IEEE.[1]

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值