[1] |
ZHANG Huiyu, CHEN Qingxin, MAO Ning.
AGV Configuration Optimization of Manufacturing System with Random Batch Material Handling
[J]. Computer Engineering and Applications, 2021, 57(4): 245-251.
|
[2] |
PENG Chunyan, DU Xiujuan.
Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(2): 76-81.
|
[3] |
GOU Jijun, LI Junhua, CHEN Chen, CHEN Yiming, LV Yida.
Network Intrusion Detection Method Based on Random Forest
[J]. Computer Engineering and Applications, 2020, 56(2): 82-88.
|
[4] |
ZHOU Long, WANG Chen, SHI Yin.
Research of Webshell Detection Based on RNN
[J]. Computer Engineering and Applications, 2020, 56(14): 88-92.
|
[5] |
WU Depeng, LIU Yi.
Intrusion Detection Model Based on Self-Organizing Map of Variable Network Structure
[J]. Computer Engineering and Applications, 2020, 56(12): 81-86.
|
[6] |
GENG Haijun.
Intra-Domain Routing Protection Scheme in Segment Routing Architecture
[J]. Computer Engineering and Applications, 2019, 55(8): 80-85.
|
[7] |
CHEN Gang, FU Jiangyue.
Drone Distribution Center Location Problem Under Military-Civilian Integration Strategy
[J]. Computer Engineering and Applications, 2019, 55(8): 226-231.
|
[8] |
SHI Leyi, LIU Jia, LIU Yihao, ZHU Hongqiang, DUAN Pengfei.
Survey of Research on Network Security Situation Awareness
[J]. Computer Engineering and Applications, 2019, 55(24): 1-9.
|
[9] |
SONG Jian, FANG Xianwen, WANG Lili, LIU Xiangwei.
Quasi Indirect Dependence Mining Method for Business Process Hide Transition
[J]. Computer Engineering and Applications, 2019, 55(22): 265-270.
|
[10] |
ZHANG Shujuan1, ZHANG Juan2.
Dynamical Modeling and Analysis of Passive Worms Propagation in P2P Networks
[J]. Computer Engineering and Applications, 2019, 55(11): 60-66.
|
[11] |
MA Zhanfei1, YANG Jin2, JIN Yi2, BIAN Qi3.
Network Intrusion Detection Method Based on IQPSO-IDE Algorithm
[J]. Computer Engineering and Applications, 2019, 55(10): 115-120.
|
[12] |
LI Haiyan1, WANG Yanping1, ZHOU Jianyong2, LIU Jiufu2.
Design of deadlock supervisor of partially controllable Petri nets
[J]. Computer Engineering and Applications, 2018, 54(8): 48-54.
|
[13] |
HAN Xiaolong, LI Shang, YANG Quanye.
Strategic supply chain integration research based on genetic algorithm
[J]. Computer Engineering and Applications, 2018, 54(2): 214-221.
|
[14] |
ZHENG Xingxing, XIE Minghong, ZHANG Yayun.
Fast collision detection algorithm based on uniform spatial subdivision and linear programming
[J]. Computer Engineering and Applications, 2017, 53(23): 236-240.
|
[15] |
FENG Bo1, GUO Fan2, TAN Suwen3.
Attack source traceback scheme based on probabilistic packet marking for IPv6 network
[J]. Computer Engineering and Applications, 2016, 52(6): 102-106.
|