[1] |
YANG Zhijun, MAO Lei, DING Hongwei, KOU Qianlan.
Analysis of Continuous Time Two-Level Exhaustive Polling Access MAC Protocol
[J]. Computer Engineering and Applications, 2022, 58(9): 136-143.
|
[2] |
GUO Jun, YU Zhiguo, HONG Guangwei, GU Xiaofeng.
Design of Firmware Update System Based on RISC-V Processor
[J]. Computer Engineering and Applications, 2022, 58(4): 298-303.
|
[3] |
WANG Mei, PENG Dandan, ZHANG Zhuangzhuang.
Research on Broadcast Timeliness of Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2022, 58(4): 100-105.
|
[4] |
CHEN Xuan, SHU Liang, LENG Yuxiang, YANG Yanfang.
Design of Digital Twin System for Circuit Breaker Flexible Assembly Workshop
[J]. Computer Engineering and Applications, 2022, 58(14): 245-257.
|
[5] |
LIU Qinghua, HUANG Shengpei, YE Jincai, KANG Yiming.
DSR Protocol Optimization Method for UAV Ad Hoc Network
[J]. Computer Engineering and Applications, 2022, 58(1): 128-133.
|
[6] |
SUN Zeyu, XU Chen, SU Yanchao, LI Chuanfeng, NIE Yalin.
CCRP:Cross-Layer-Sensing Clustering Routing Protocol in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(9): 109-117.
|
[7] |
ZHAO Jing, WANG Ruwu, ZHOU Hao.
Simulation Research of MQTT Protocol Based on NS-3
[J]. Computer Engineering and Applications, 2021, 57(23): 137-145.
|
[8] |
FANG Kanfei, LIN Zhitin, ZHAO Jianzhong, LI Zhi, BI Liqiang.
Design of New BMC Decoding Circuit for USB PD3.0 Protocol
[J]. Computer Engineering and Applications, 2021, 57(1): 77-83.
|
[9] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[10] |
ZHU Zhishen,LING Jie,LIN Peng.
Data Integrity Checking Technology of Industrial Control System Based on Covert Channel
[J]. Computer Engineering and Applications, 2020, 56(9): 125-130.
|
[11] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[12] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[13] |
HONG Zheng, GONG Qiyuan, FENG Wenbo, LI Yihao.
Unknown Application Layer Protocol Recognition Based on Adaptive Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 109-117.
|
[14] |
ZHANG Hongze, HONG Zheng, ZHOU Shengli, FENG Wenbo.
Fuzzing Optimization Method Based on Protocol State Migration Traversal
[J]. Computer Engineering and Applications, 2020, 56(4): 82-91.
|
[15] |
YANG Haoyun, WANG Junfeng, LIU Jiayong, TANG Zhangguo.
Research and Implementation of Covert Channel of SSL Protocol
[J]. Computer Engineering and Applications, 2020, 56(20): 67-72.
|