[1] |
WEI Jihong, ZHENG Rongfeng, LIU Jiayong.
Research on Malicious TLS Traffic Identification Based on Hybrid Neural Network
[J]. Computer Engineering and Applications, 2021, 57(7): 107-114.
|
[2] |
WANG Tengfei, CAI Manchun, YUE Ting, LU Tianliang.
Tor Anonymous Traffic Identification Based on Histogram-XGBoost
[J]. Computer Engineering and Applications, 2021, 57(14): 110-115.
|
[3] |
YOU Yun, WAN Changxuan, JIANG Tengjiao.
Project Default Risk Prediction Considering Social Network in P2P Lending
[J]. Computer Engineering and Applications, 2021, 57(13): 239-245.
|
[4] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[5] |
WANG Xin, GAO Yan, CHEN Yi, QIU Jingjun.
Combat Team’s Hierarchical Behavior Modeling
[J]. Computer Engineering and Applications, 2020, 56(12): 250-255.
|
[6] |
GAO Ang, DUAN Li, ZHANG Guohui, DONG Zhiming, CAO Jie, GUO Qisheng.
Development Status of Computer Generated Force Behavior Modeling
[J]. Computer Engineering and Applications, 2019, 55(19): 43-51.
|
[7] |
SUN Dandan1,2, LUO Yonglong1,2, FAN Guoting1,2, GUO Liangmin1,2, ZHENG Xiaoyao1,2.
Location privacy-preserving method against attacks under P2P communication
[J]. Computer Engineering and Applications, 2018, 54(9): 75-83.
|
[8] |
ZHAO Zhiguo, TAN Bang, XIA Shiying, TAN Minsheng.
P2P network comprehensive trust model based on time series
[J]. Computer Engineering and Applications, 2017, 53(15): 127-131.
|
[9] |
HE Ke, WU Xiaojun, ZHANG Yumei.
Topology research of unstructured P2P network based on node of interest
[J]. Computer Engineering and Applications, 2016, 52(9): 102-107.
|
[10] |
LI Zhiyuan1,2.
Analysis and research on ARES P2P file sharing protocol
[J]. Computer Engineering and Applications, 2016, 52(24): 1-5.
|
[11] |
SHEN Yuanzhong, WANG Xu, MENG Xianfu.
Two-layer-relation prefetching strategy in P2P VoD system
[J]. Computer Engineering and Applications, 2016, 52(19): 134-139.
|
[12] |
CHEN Fu1, YANG Jiahai2, XU Yuemei1.
Study and implementation on network management architecture under discrete services
[J]. Computer Engineering and Applications, 2016, 52(15): 126-134.
|
[13] |
WANG Yuhua, JIANG Lin, HU Zhigang, YANG Liu.
Load balancing algorithm for DHT-based P2P system
[J]. Computer Engineering and Applications, 2015, 51(23): 100-105.
|
[14] |
SHAN Kai, GAO Zhonghe, LI Fengyin.
Identifying P2P flow in cloud computing
[J]. Computer Engineering and Applications, 2015, 51(19): 88-92.
|
[15] |
WANG Hui, WANG Zheng.
Bidirectional search chord routing algorithm based on new finger table
[J]. Computer Engineering and Applications, 2014, 50(23): 95-99.
|