[1] |
HE Liwen, HOU Xiaoyu, TANG Chengcheng, ZHOU Rui, ZHANG Xingning.
Rootkit Universality Detection Method for Heterogeneous BIOS Environments
[J]. Computer Engineering and Applications, 2019, 55(23): 105-112.
|
[2] |
WANG Yong1,2, SHANG Wenli2, ZHAO Jianming2, WAN Ming2, YUAN Weiwei1.
Design of embedded trusted computing platform based on TPM
[J]. Computer Engineering and Applications, 2018, 54(13): 105-110.
|
[3] |
MA Liang, QIAN Xuezhong.
Research on critical path of Web service call based on trusted computing
[J]. Computer Engineering and Applications, 2016, 52(3): 230-235.
|
[4] |
WEI Lin1, ZHANG Chong2, LIU Yongchao2, FU Hua2, YIN Yuping2.
Gas concentration Gaussian prediction model based on dynamic clustering
[J]. Computer Engineering and Applications, 2015, 51(24): 260-265.
|
[5] |
TANG Lili.
Text feature selection method based on information entropy and dynamic clustering
[J]. Computer Engineering and Applications, 2015, 51(19): 152-157.
|
[6] |
SHANG Jing, XU Kaiyong, YANG Qichao.
Trusted boot for computer centralized control system-oriented architecture
[J]. Computer Engineering and Applications, 2015, 51(17): 64-69.
|
[7] |
YIN Yuping1, LIU Wanjun2, ZHANG Chong1, LIU Yongchao1.
Automatic documents fragment re-assembly algorithm based on dynamic clustering
[J]. Computer Engineering and Applications, 2014, 50(18): 162-166.
|
[8] |
ZHAO Bo1,2, FEI Yongkang1,2, XIANG Shuang1,2, LI Yifan1,2.
Research and implementation of secure boot mechanism for embedded systems
[J]. Computer Engineering and Applications, 2014, 50(10): 72-77.
|
[9] |
WANG Sha, GAO Maoting.
New projection pursuit dynamic clustering model based on mixed PSO
[J]. Computer Engineering and Applications, 2013, 49(8): 198-202.
|
[10] |
CHENG Ge, LI Cong.
Research progress of trusted computing environment
[J]. Computer Engineering and Applications, 2013, 49(13): 59-64.
|
[11] |
XIAO Sheng1, XING Changfeng2, SHI Zhangsong2.
Dynamic clustering scheme for target tracking in wireless sensor networks
[J]. Computer Engineering and Applications, 2012, 48(35): 88-92.
|
[12] |
JIANG Delong, WANG Kewen.
Research in evaluation for algorithms of bad-data detection and identification
[J]. Computer Engineering and Applications, 2012, 48(22): 239-243.
|
[13] |
LIU Lan, YUAN Daohua, TONG Xing, WANG Zhonglei.
Distributed trusted verification mechanism for trusted computing platform
[J]. Computer Engineering and Applications, 2012, 48(2): 99-102.
|
[14] |
CHONG Huifang,WU Zhenqiang,WANG Haiyan.
Property-supported self-attestation model and its secure protocol
[J]. Computer Engineering and Applications, 2011, 47(7): 110-113.
|
[15] |
GAI Xinmao1,2,SHEN Changxiang2,3,LI Yong2,4,LIU Yi3.
Method for layering components towards structured protection
[J]. Computer Engineering and Applications, 2011, 47(36): 25-28.
|