[1] |
WANG Tong, ZHU Minling.
Study on Fast Realization of Serial Test and Approximate Entropy Test
[J]. Computer Engineering and Applications, 2020, 56(15): 113-117.
|
[2] |
LV Congdong.
Relation between IP-secure and TA-secure in intransitive non-interference
[J]. Computer Engineering and Applications, 2018, 54(8): 78-84.
|
[3] |
XU Guoyu, MIAO Xuna, ZHANG Junfeng, JIANG Tao, MA Xiaofei.
Review of implicit authentication for mobile devices
[J]. Computer Engineering and Applications, 2018, 54(6): 19-25.
|
[4] |
ZHAO Hongda, QI Yong, LI Qianmu.
Ubiquitous network security risk assessment modeling based on COOPN
[J]. Computer Engineering and Applications, 2018, 54(4): 122-127.
|
[5] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[6] |
GUAN Xin, GUO Junping, WANG Xing.
Double fuzzy information security evaluation algorithm based on improved DS theory
[J]. Computer Engineering and Applications, 2017, 53(2): 112-117.
|
[7] |
CHEN Yu, WANG Yadi, WANG Jindong, LI Tao.
Study of influence on information security risks by delays of security measures
[J]. Computer Engineering and Applications, 2017, 53(19): 118-123.
|
[8] |
LIN Xianning.
Selection method of information security system based on hesitant linguistic Heronian geometric operator
[J]. Computer Engineering and Applications, 2017, 53(13): 174-180.
|
[9] |
LU Yang, GAO Bao.
Research on file integrity checking based on CityHash for e-government websites
[J]. Computer Engineering and Applications, 2016, 52(4): 104-109.
|
[10] |
CHEN Yun1,2, SHI Song1,2, PAN Yan1,2, YU Li2.
Hybrid ensemble approach for credit risk assessment based on SVM
[J]. Computer Engineering and Applications, 2016, 52(4): 115-120.
|
[11] |
WANG Xueli1, ZHANG Xuan1,3, LI Tong1,3, WANG Xu2.
Method of risk assessment oriented to trustworthy software
[J]. Computer Engineering and Applications, 2016, 52(19): 97-101.
|
[12] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[13] |
ZHOU Wei1, XIE Wenbin2, LI Lei3.
A kind of Cyberspace security framework design and risk assessment method
[J]. Computer Engineering and Applications, 2016, 52(18): 122-126.
|
[14] |
ZHANG Yongzheng, GENG Xiuli.
Risk assessment of service outsourcing based on DEMATEL and VIKOR
[J]. Computer Engineering and Applications, 2016, 52(18): 240-245.
|
[15] |
ZHANG Xuan1,2, LIN Yifeng1, BAI Chuan1, WANG Xu3, MA Muting1, YU Qian1,2.
Risk assessment model for mobile payment based on Bayesian network
[J]. Computer Engineering and Applications, 2014, 50(5): 60-64.
|