[1] |
SUN Zeyu, XU Chen, SU Yanchao, LI Chuanfeng, NIE Yalin.
CCRP:Cross-Layer-Sensing Clustering Routing Protocol in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(9): 109-117.
|
[2] |
ZHAO Jing, WANG Ruwu, ZHOU Hao.
Simulation Research of MQTT Protocol Based on NS-3
[J]. Computer Engineering and Applications, 2021, 57(23): 137-145.
|
[3] |
FANG Kanfei, LIN Zhitin, ZHAO Jianzhong, LI Zhi, BI Liqiang.
Design of New BMC Decoding Circuit for USB PD3.0 Protocol
[J]. Computer Engineering and Applications, 2021, 57(1): 77-83.
|
[4] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[5] |
ZHU Zhishen,LING Jie,LIN Peng.
Data Integrity Checking Technology of Industrial Control System Based on Covert Channel
[J]. Computer Engineering and Applications, 2020, 56(9): 125-130.
|
[6] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[7] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[8] |
WANG Jie, CHEN Zhigang, LIU Jialing, CHENG Hongbing.
Privacy Behavior Mining Technology for Cloud Computing Based on Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 80-84.
|
[9] |
HONG Zheng, GONG Qiyuan, FENG Wenbo, LI Yihao.
Unknown Application Layer Protocol Recognition Based on Adaptive Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 109-117.
|
[10] |
ZHANG Hongze, HONG Zheng, ZHOU Shengli, FENG Wenbo.
Fuzzing Optimization Method Based on Protocol State Migration Traversal
[J]. Computer Engineering and Applications, 2020, 56(4): 82-91.
|
[11] |
LI Mengte, GU Chunhua, WEN Mi.
Secure Charging Transaction Data Storage Platform Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(21): 79-84.
|
[12] |
YANG Haoyun, WANG Junfeng, LIU Jiayong, TANG Zhangguo.
Research and Implementation of Covert Channel of SSL Protocol
[J]. Computer Engineering and Applications, 2020, 56(20): 67-72.
|
[13] |
PENG Chunyan, DU Xiujuan.
Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(2): 76-81.
|
[14] |
HUANG Xuebo, XU Zhengguo, YAN Jikun.
High-Frequency Similar Sequence Extraction Algorithm of Protocol Data Based on Simhash
[J]. Computer Engineering and Applications, 2020, 56(16): 199-203.
|
[15] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|