Research on Optimization of Network Attack Detection Model Based on Imbalanced Data
Saved in:
Published in | Computer science and application Vol. 14; no. 11; pp. 1 - 10 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
2024
|
Online Access | Get full text |
ISSN | 2161-8801 2161-881X |
DOI | 10.12677/csa.2024.1411210 |
Cover
Author | 杨, 思瑶 |
---|---|
Author_xml | – sequence: 1 givenname: 思瑶 surname: 杨 fullname: 杨, 思瑶 |
BookMark | eNqdj82qwjAUhIMo-PsA7vIC1pxobbf-ogsV1IW7cIynWG0bSQJy79NbRXwAZzMzDLP4mqxamIIY64IIQI6iqK8dBlLIYQBDAAmiwhoSRtCLYzhWv1lAnXWcu4pSYTgIo7jB9jtyhFZfuCn49u7TPP1Hn5bFJHxD_mHsjY-9R33jM_Kk39vanCnjE3R0fv1W-QkzLHTZZuixzWoJZo46H28xWMwP02VPW-OcpUTdbZqj_VMg1BtAlQDqBaA-AINfPk-gvVAj |
Cites_doi | 10.1186/s40537-024-00994-7 10.1016/j.atech.2024.100548 10.1177/14738716241260745 10.1016/j.heliyon.2024.e36663 10.1016/j.saa.2024.125101 10.1093/jamiaopen/ooae091 10.1016/j.iot.2024.101336 10.1007/s41870-024-02172-7 10.1016/j.isci.2024.110716 10.1213/ane.0000000000006832 10.1016/j.cscm.2024.e03750 10.37155/2717-5170-0607-47 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.12677/csa.2024.1411210 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 2161-881X |
EndPage | 10 |
ExternalDocumentID | 10_12677_csa_2024_1411210 |
GroupedDBID | .DC AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION KQ8 RNS |
ID | FETCH-crossref_primary_10_12677_csa_2024_14112103 |
ISSN | 2161-8801 |
IngestDate | Tue Jul 01 03:22:51 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 11 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-crossref_primary_10_12677_csa_2024_14112103 |
ParticipantIDs | crossref_primary_10_12677_csa_2024_1411210 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-00-00 |
PublicationDateYYYYMMDD | 2024-01-01 |
PublicationDate_xml | – year: 2024 text: 2024-00-00 |
PublicationDecade | 2020 |
PublicationTitle | Computer science and application |
PublicationYear | 2024 |
References | ref13 ref12 ref15 ref14 ref11 ref10 ref2 ref1 ref16 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref1 – ident: ref5 doi: 10.1186/s40537-024-00994-7 – ident: ref10 doi: 10.1016/j.atech.2024.100548 – ident: ref2 – ident: ref3 – ident: ref16 doi: 10.1177/14738716241260745 – ident: ref8 doi: 10.1016/j.heliyon.2024.e36663 – ident: ref14 doi: 10.1016/j.saa.2024.125101 – ident: ref11 doi: 10.1093/jamiaopen/ooae091 – ident: ref9 doi: 10.1016/j.iot.2024.101336 – ident: ref6 doi: 10.1007/s41870-024-02172-7 – ident: ref7 doi: 10.1016/j.isci.2024.110716 – ident: ref13 doi: 10.1213/ane.0000000000006832 – ident: ref12 doi: 10.1016/j.cscm.2024.e03750 – ident: ref4 doi: 10.37155/2717-5170-0607-47 – ident: ref15 |
SSID | ssj0000553578 |
Score | 4.4853363 |
SourceID | crossref |
SourceType | Index Database |
StartPage | 1 |
Title | Research on Optimization of Network Attack Detection Model Based on Imbalanced Data |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ07T8MwEIAtKAsLAgHiLQ9koQrgkEcztrSogAAhitQtclxngSYIwsKv586OE6uA1LJEjdWcEn3JnX2-ByHHXpYFIspirG_HXT_2hAt2PXCzVEjsPxXIFHOH7-7D4bN_Mw7GTXsrlV1Spqfi69e8kv9QhTHgilmyC5CthcIA_Aa-cATCcJyLsQmbQ4__A3z70yqpUrkBdHx3u1uWXLyAXiml7gqO3c9e2z2wXhO87nqaYnQjhgH0dZ5aU7mg6vjQNrk_qrBrs-NtYDmD0In7TreDvPAEoyf6ziByYub0QtuxoDOZtebxYBrowoetoUt7TPW3aVSnb78izFKEzLKoOm71h672QrVdLD6w_JPng85mWM2sMUxmM37GXtVRhLh-QSEJiEhQRFKJWCYrXhQxjPC8fezULrfzIMDaPthu0Dxgtc-NUs5mb8SaqVhTjtE6WavWCrSrwW-QJZlvkicDnRY5taHTIqMVdKqh0xo6VdCpgo7XNdApQt8i7Gowuhy65k6SN12EJPnz4S-2SSsvcrlDqMzisCP4JOQshmlxzHkW8XQisNMch4XALjmZX-7eIn_eJ6t4qn1VB6RVvn_KQ5i9lemRYvINJ_dDag |
linkProvider | Colorado Alliance of Research Libraries |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+Optimization+of+Network+Attack+Detection+Model+Based+on+Imbalanced+Data&rft.jtitle=Computer+science+and+application&rft.au=%E6%9D%A8%2C+%E6%80%9D%E7%91%B6&rft.date=2024&rft.issn=2161-8801&rft.eissn=2161-881X&rft.volume=14&rft.issue=11&rft.spage=1&rft.epage=10&rft_id=info:doi/10.12677%2Fcsa.2024.1411210&rft.externalDBID=n%2Fa&rft.externalDocID=10_12677_csa_2024_1411210 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2161-8801&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2161-8801&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2161-8801&client=summon |