[1] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[2] |
ZHANG Shiqi, WEI Feifei, FAN Xinyue.
Model of Secure Routes Selection Influenced by Weather and Traffic Accidents
[J]. Computer Engineering and Applications, 2021, 57(10): 246-251.
|
[3] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[4] |
XU Guoyu, XU Gang, JIANG Tao, HU Haitao.
Research on Quantitative Analysis of Authentication Mechanism Performance for Space-Ground Integrated Information Network
[J]. Computer Engineering and Applications, 2020, 56(21): 108-114.
|
[5] |
SHI Hui, CAI Yueming, YANG Weiwei, XIANG Zhongwu, CHEN Dechuan.
Secure Performance Analysis on Untrusted Relay Network with TSR over Nakagami-[m] Channel
[J]. Computer Engineering and Applications, 2020, 56(12): 98-104.
|
[6] |
JIA Zhichun, LU Yuan, LI Xiang, XING Xing.
Multi-Parameter Web Services Selection Method
[J]. Computer Engineering and Applications, 2019, 55(21): 74-78.
|
[7] |
WU Xiaoquan1,2, LI Hui1,2, CHEN Mei1,2, DAI Zhenyu1,2.
DRVisSys: visualization recommendation system based on attribute correlation analysis
[J]. Computer Engineering and Applications, 2018, 54(7): 251-256.
|
[8] |
ZHOU Hao1, WANG Jingkang1, WANG Bo2, LUO Yutao1, MA Zewen1, LIU Gongshen1.
Comprehensive overview of plaintext password generation models
[J]. Computer Engineering and Applications, 2018, 54(4): 9-16.
|
[9] |
JIANG Jieqi, YANG Geng, LI Peng.
Analysis of users’ behavior under cloud computing environment
[J]. Computer Engineering and Applications, 2018, 54(14): 127-132.
|
[10] |
PAN Li1,2, DENG Jia1, WANG Yongli1.
HMM-Cluster: Trajectory clustering for discovering traffic volume overload
[J]. Computer Engineering and Applications, 2018, 54(1): 77-85.
|
[11] |
HUO Shimin, ZHAO Jumin, LI Deng’ao, ZHU Biaokai.
Illegal intrusion detection algorithm based on abnormal signal sequences
[J]. Computer Engineering and Applications, 2017, 53(20): 68-74.
|
[12] |
MA Zhenghua1, LI Lei2, QIAO Yutao2, RONG Hailong3, CAO Haiting2.
Dynamic gesture recognition research and analysis based on multi-sensor fusion
[J]. Computer Engineering and Applications, 2017, 53(17): 153-159.
|
[13] |
XIAO Xiaohong1, ZHANG Yi2, LIU Dongsheng1, OUYANG Chunjuan1.
Music classification based on Hidden Markov Models
[J]. Computer Engineering and Applications, 2017, 53(16): 138-143.
|
[14] |
SHEN Lei, YANG Jianfeng, XU Jun, GUO Chengcheng.
Design of TDMA protocol in wireless control network
[J]. Computer Engineering and Applications, 2017, 53(11): 142-145.
|
[15] |
GE Yongkan, YU Fengqin .
Improved speech synthesis with adaptive postfilter parameters
[J]. Computer Engineering and Applications, 2017, 53(1): 168-171.
|