[1] |
陈剑, 李贺武, 张晓岩 , 等. IEEE 802.11n中速率、模式及信道的联合自适应算法[J]. 软件学报, 2015,26(1):98-108. CHEN J , LI H W , ZHANG X Y , et al. Joint adaptation algorithm of rate,mode and channel for IEEE 802.11n[J]. Journal of Software, 2015,26(1):98-108.
|
[2] |
孙全富 . 无线局域网数据加密和接入认证机制安全性研究[D]. 新疆大学, 2013. SUN Q F . Research on data encryption and access authentication mechanism in wireless local area network security[D]. Xinjiang Uni-versity, 2013.
|
[3] |
叶彩红 . 基于 IEEE802.11b 无线网络控制系统的建模与控制[D]. 燕山大学. 2010. YE C H . Modeling and control for wireless networked control systems based on IEEE 802.11b[D]. Yanshan University, 2010.
|
[4] |
周勇林 . Wi-Fi 网络安全问题与防护建议[J]. 通信管理与技术, 2016,03:19-20. ZHOU Y L . Wi-Fi network security issues and protection recommen-dations[J]. Communication Management and Technology, 2016,03:19-20.
|
[5] |
任勇金 . 浅谈Wi-Fi技术及其发展前景[J]. 信息通信, 2012:5-87. REN Y J . Talking about the Wi-Fi technology and its development prospects[J]. Information Communication, 2012:5-87.
|
[6] |
盛仲飙 . Wi-Fi无线网络技术及安全性研究[J]. 电子设计工程, 2012,20(16):1-3. SHENG Z B . Wi-Fi wireless network technology and security research of[J]. Electronic Design Engineering, 2012,20(16):1-3.
|
[7] |
高建华, 鲁恩铭 . 无线局域网中 Wi-Fi 安全技术研究[J]. 计算机安全, 2013(4):37-39. GAO J H , LU E M . Research on Wi-Fi security technology in WLAN[J]. Computer Security, 2013(4):37-39.
|
[8] |
王涛, 张丽莎, 高岩 . 基于 BP 神经网络的改进型新奇检测技术诊断大跨度拱桥异常状态[J]. 北京理工大学学报, 2016,36(2):157-162. WANG T , ZHANG L S , GAO Y . Abnormality identification of large-span arch bridge based on BP neural improved novelty detection technique[J]. Journal of Beijing Institute of Technology, 2016,36(2):157-162.
|
[9] |
吕红芳, 顾幸生 . 基于蚁群神经网络的两级信息融合算法[J]. 上海交通大学学报, 2016,50(8):1323-1330. LV H F , GU X S . A two level information fusion algorithm based on ant colony neural network[J]. Journal of Shanghai Jiao Tong Univer-sity, 2016,50(8):1323-1330.
|
[10] |
陶跃, 田迎华 . 多级可拓评价方法在网络安全评价中的应用[J]. 吉林大学学报(信息科学版), 2013,31(1):95-100. TAO Y , TIAN Y H . Application of multilevel extension assessment method in network security evaluation[J]. Journal of Jilin University (Information Science Edition), 2013,31(1):95-100.
|
[11] |
黄亮, 冯登国, 连一峰 , 等. 一种基于多属性决策的 DDoS 防护措施遴选方法[J]. 软件学报, 2015,7:1742-1756. HUANG L , FENG D G , LIAN Y F , et al. Method of DDoS counter-measure selection based on multi-attribute decision making[J]. Journal of Software, 2015,7:1742-1756.
|
|
Android.net.Wi-Fi包ScanResult类中Wi-Fi无线热点信息[EB/OL]. .Android.net.Wi-Fi package ScanResult class Wi-Fi wireless hotspot information[EB/OL]. .
|
[13] |
Robert Hecht-Nielsen. Theory of the back propagation neural net-work[C]//The International Joint Conference on Neural Networks. 1989:593-605.
|
[14] |
李健宏, 李广振 . 网络安全综合评价方法的应用研究[J]. 计算机仿真, 2011,28(7):165-168. LI J H , LI G Z . Application study on evaluation method of network security[J]. Computer Simulation, 2011,28(7):165-168.
|