Algorithm of sequence in network intrusion based on privacy preservation

LI Wei-ying

PDF(367 KB)
PDF(367 KB)
Journal of Shenyang Aerospace University ›› 2013, Vol. 30 ›› Issue (4) : 53-57. DOI: 10.3969/j.issn.2095-1248.2013.04.011
Computer Engineering

Algorithm of sequence in network intrusion based on privacy preservation

    {{javascript:window.custom_author_en_index=0;}}
  • {{article.zuoZhe_EN}}
Author information +
History +

HeighLight

{{article.keyPoints_en}}

Abstract

{{article.zhaiyao_en}}

Key words

Cite this article

Download Citations
{{article.zuoZheEn_L}}. {{article.title_en}}. {{journal.qiKanMingCheng_EN}}. 2013, 30(4): 53-57 https://doi.org/10.3969/j.issn.2095-1248.2013.04.011

References

References

{{article.reference}}

Funding

RIGHTS & PERMISSIONS

{{article.copyrightStatement_en}}
{{article.copyrightLicense_en}}
PDF(367 KB)

Accesses

Citation

Detail

Sections
Recommended

/