[1] |
PENG Chunyan, DU Xiujuan.
Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(2): 76-81.
|
[2] |
GOU Jijun, LI Junhua, CHEN Chen, CHEN Yiming, LV Yida.
Network Intrusion Detection Method Based on Random Forest
[J]. Computer Engineering and Applications, 2020, 56(2): 82-88.
|
[3] |
ZHOU Long, WANG Chen, SHI Yin.
Research of Webshell Detection Based on RNN
[J]. Computer Engineering and Applications, 2020, 56(14): 88-92.
|
[4] |
WU Depeng, LIU Yi.
Intrusion Detection Model Based on Self-Organizing Map of Variable Network Structure
[J]. Computer Engineering and Applications, 2020, 56(12): 81-86.
|
[5] |
SHI Leyi, LIU Jia, LIU Yihao, ZHU Hongqiang, DUAN Pengfei.
Survey of Research on Network Security Situation Awareness
[J]. Computer Engineering and Applications, 2019, 55(24): 1-9.
|
[6] |
ZHANG Shujuan1, ZHANG Juan2.
Dynamical Modeling and Analysis of Passive Worms Propagation in P2P Networks
[J]. Computer Engineering and Applications, 2019, 55(11): 60-66.
|
[7] |
MA Zhanfei1, YANG Jin2, JIN Yi2, BIAN Qi3.
Network Intrusion Detection Method Based on IQPSO-IDE Algorithm
[J]. Computer Engineering and Applications, 2019, 55(10): 115-120.
|
[8] |
GUO Rui, ZHANG Xuefeng.
Combination fingerprint template protection algorithm based on Bloom filter and block
[J]. Computer Engineering and Applications, 2018, 54(6): 75-80.
|
[9] |
ZHANG Man1, XIAN Hequn1,2, ZHANG Shuguang1.
Fast keyword query technique in encrypted databases
[J]. Computer Engineering and Applications, 2018, 54(13): 78-83.
|
[10] |
YIN Qinqin.
Secure deduplication approach based on Bloom Filter in hybrid cloud storage environments
[J]. Computer Engineering and Applications, 2018, 54(10): 73-80.
|
[11] |
LI Juanjuan1, GONG Xiangyang2.
Fast cloned tags detection algorithm in large-scale RFID systems
[J]. Computer Engineering and Applications, 2017, 53(8): 106-112.
|
[12] |
DAI Zhen1,2, CHENG Guang1,2.
Advanced persistent threat detection based on characteristics of communications
[J]. Computer Engineering and Applications, 2017, 53(18): 77-83.
|
[13] |
FENG Bo1, GUO Fan2, TAN Suwen3.
Attack source traceback scheme based on probabilistic packet marking for IPv6 network
[J]. Computer Engineering and Applications, 2016, 52(6): 102-106.
|
[14] |
WU Luqing, WANG Ze.
Security design based on location key for mobile Ad-Hoc networks
[J]. Computer Engineering and Applications, 2016, 52(16): 132-136.
|
[15] |
MENG Jinfeng, GAO Zhonghe.
Flow sampling measurement algorithm based on dynamic counting bloom filter
[J]. Computer Engineering and Applications, 2015, 51(17): 92-95.
|