- Network Security and Intrusion Detection
- Advanced Computational Techniques and Applications
- Geographic Information Systems Studies
- Network Packet Processing and Optimization
- Distributed and Parallel Computing Systems
- Advanced Sensor and Control Systems
- Artificial Immune Systems Applications
- Advanced Optical Network Technologies
- Scientific Computing and Data Management
- Functional Brain Connectivity Studies
- EEG and Brain-Computer Interfaces
- Neural dynamics and brain function
- IPv6, Mobility, Handover, Networks, Security
- Optical Network Technologies
- Service-Oriented Architecture and Web Services
- Smart Grid and Power Systems
- Anomaly Detection Techniques and Applications
- Geological Modeling and Analysis
- Electric Power Systems and Control
- Digital and Cyber Forensics
- Banking Systems and Strategies
- Web Applications and Data Management
- Simulation and Modeling Applications
- Reservoir Engineering and Simulation Methods
- Advanced Photonic Communication Systems
Beijing University of Posts and Telecommunications
2008-2021
PLA Information Engineering University
2007-2021
Yanshan University
2018
Jingdong (China)
2007
As an important part of intrusion detection, feature selection plays a significant role in improving the performance detection. Krill herd (KH) algorithm is efficient swarm intelligence with excellent data mining. To solve problem low efficiency and high false positive rate detection caused by increasing high-dimensional data, improved krill based on linear nearest neighbor lasso step (LNNLS-KH) proposed for network The number selected features classification accuracy are introduced into...
Abstract With the rapid development of network attacks, traditional security protection technology is difficult to deal with unknown threats and persistent attacks. Active defense improves ability defend against attacks by building a dynamic, heterogeneous redundant endogenous system. Aiming at problem single abnormal arbitrament information routers in mimic defense, router traffic detection strategy based on active proposed. By clustering multiple routing function entities comparing...
With the rapid development of computer and internet technology, degree power informatization is deepening, which further promotes growing scale network. As a result, while bringing convenience to business, it also brings new network security risks challenges. In this paper, system protection combined with zero trust designed improve ability as whole. The access subject judged through control dynamic engine, only authentication passes can pass, trusted agent encrypts traffic at same time;...
Nowadays, most firewalls which are deployed in networks not compatible with mobile IPv6. And to modify the configuration of firewall by using NSIS signaling is one solutions. In this paper, purpose resolve problems IPv6 network environment during traversal process signaling. We introduce a new method that can reduce complexity signaling, decrease time delay network. addition, detection and both based on NSIS, make more consummate.
Reservoir studies are crucial to obtain accurate assessments and predictions of reservoir performance. However, this is a challenging issue because 1) it relies on massive modeling-related, geographically distributed, terabyte or even petabyte sized datasets (seismic well-logging data), 2) needs rapidly perform hundreds thousands simulations, being identical runs with different models circulating the impacts various uncertainty factors, 3) lack easy-to-use problem solving toolkits assist...
Photonic firewall primarily uses all-optical pattern matching techniques in the optical domain to filter information carried by signals. Its purpose is identify hidden network intrusions and attacks. Based on advantages of fast processing, high efficiency large capacity, one photonic can replace tens thousands traditional electronic firewalls. However, it difficult place firewalls at any node because its technology still immature early stages research. Therefore, several suitable nodes are...