當前位置:編程學習大全網 - 源碼下載 - 張小強的學術論文

張小強的學術論文

Xiaoqiang Zhang, Pingzhi Fan, Zhongliang Zhu, “A New Anomaly Detection Method Based On Two-Hierarchy HMM”, PDCAT03,Chengdu,2003(EI Index) 2. Xiaoqiang Zhang, Zhongliang Zhu“Combining HMM and Neural Network to recognize novel intrusion”,ICMLC2004,Shanghai,2004(EI Index)

3. 張小強,朱中梁,範平誌,“基於系統呼叫和網絡數據包的兩層入侵檢測系統”,計算機工程,2005 (EI Index)

4. Mingxing He, Pingzhi Fan, Xiaoqiang Zhang,”K-party shared RSA key generation”,電子信息學報,2003.1(英文版)

5. Xiaoqiang Zhang, Zhongliang Zhu,Pingzhi Fan. “Intrusion Detection Using Cross-Correlation of System Call Sequences”, ICTAI05, Hong Kong, November 2005(SCI, 9025859)

6. 張小強,朱中梁,範平誌,“基於SVM和序列互相關特性的入侵檢測研究”,全國博士論壇,北京,2005年7月

7. 張小強,朱中梁,範平誌,“基於序列互相關特性和SVM的入侵檢測研究”,鐵道學報, Vol.29, No.3, 2007,6

8. 張小強,朱中梁,範平誌,“基於T檢測和SVM的入侵侵檢測研究”,鐵道學報, Vol.29, No.6, 2007,12

9. Xiaoqiang Zhang, Zhongliang Zhu,Pingzhi Fan. “Intrusion Detection Based on the Second-stochastic Model”, Journal of Electronics,June 2007

10.Xiaoqiang Zhang, Pengyan, “Design of the Integrated Security Defending System for Logistics Information System”, ICCLTP2008, October 2008, Chengdu(EI待收錄)

11.Xiaoqiang Zhang, Yan Peng, “Anti-collision Performance analysis for passive RFID tag”, ICCLTP 2008, October 2008, Chengdu (EI待收錄)

12.張小強,高速移動環境下多目標RFID信息獲取的關鍵技術,西南交通大學學術動態 2008.3

13.張小強,彭燕,物流類專業學生的信息技術能力培養研究,2008四川省高教學術年會,2008.10

14.張小強,RFID的自適應二進制搜索算法研究,2008海峽兩岸物流學術年會

15. Yihaiyang,YeHuaizheng, Zhangxiaoqiang,Risk Management Models Of Supply Chain Disruption With Segregated Option Contract,ICCLTP2008, ASCE

16.Xuling, Yangqing,Zhangxiaoqiang,Research On Hybrid Simulation of Production Logistics Equipment Based on Industrial control Network,ICCLTP2008, ASCE

17.肖筠,張小強,基於RFID的快遞物流配送系統設計,《經營管理者》2008年10月第10期 18.付江月,張小強,區域物流中心自動配送流程設計,《中國儲運》2008年12月

  • 上一篇:合同書樣本通用5篇
  • 下一篇:IC卡和ID卡發卡器有什麽區別,各自工作原理是什麽
  • copyright 2024編程學習大全網