[1] |
SUN Zeyu, XU Chen, SU Yanchao, LI Chuanfeng, NIE Yalin.
CCRP:Cross-Layer-Sensing Clustering Routing Protocol in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(9): 109-117.
|
[2] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[3] |
TIAN Yuan, LI Fangdi.
Research Review on Human Body Gesture Recognition Based on Depth Data
[J]. Computer Engineering and Applications, 2020, 56(4): 1-8.
|
[4] |
GOU Jijun, LI Junhua, CHEN Chen, CHEN Yiming, LV Yida.
Network Intrusion Detection Method Based on Random Forest
[J]. Computer Engineering and Applications, 2020, 56(2): 82-88.
|
[5] |
ZHOU Long, WANG Chen, SHI Yin.
Research of Webshell Detection Based on RNN
[J]. Computer Engineering and Applications, 2020, 56(14): 88-92.
|
[6] |
PAN Rongmin, YUAN Jie, WANG Hongwei, MI Tang.
Research on Tracking Method of Mobile Robot Fusing Depth Information
[J]. Computer Engineering and Applications, 2020, 56(14): 161-168.
|
[7] |
WU Depeng, LIU Yi.
Intrusion Detection Model Based on Self-Organizing Map of Variable Network Structure
[J]. Computer Engineering and Applications, 2020, 56(12): 81-86.
|
[8] |
QIN Feng, ZENG Hao, LIN Kaidong.
Load Balancing-Based Routing Protocol for LLN Under High-Load Scenario
[J]. Computer Engineering and Applications, 2020, 56(1): 121-126.
|
[9] |
SHI Leyi, LIU Jia, LIU Yihao, ZHU Hongqiang, DUAN Pengfei.
Survey of Research on Network Security Situation Awareness
[J]. Computer Engineering and Applications, 2019, 55(24): 1-9.
|
[10] |
WANG Yanjiao, TANG Qi.
Improved Routing Energy Algorithm for Heterogeneous Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(22): 80-85.
|
[11] |
ZHAN Jiacheng1, WANG Qiuhua2, OUYANG Xiaoqin1.
Source-Location Privacy Protection Routing Protocol in Wireless Sensor Networks by Avoiding Attackers
[J]. Computer Engineering and Applications, 2019, 55(12): 103-109.
|
[12] |
ZHANG Shujuan1, ZHANG Juan2.
Dynamical Modeling and Analysis of Passive Worms Propagation in P2P Networks
[J]. Computer Engineering and Applications, 2019, 55(11): 60-66.
|
[13] |
MA Zhanfei1, YANG Jin2, JIN Yi2, BIAN Qi3.
Network Intrusion Detection Method Based on IQPSO-IDE Algorithm
[J]. Computer Engineering and Applications, 2019, 55(10): 115-120.
|
[14] |
KANG Hongkai, WU Lifa, HONG Zheng, ZHUANG Honglin, ZHANG Yafeng.
Fuzzing method for BGP-4 protocol based on FSM
[J]. Computer Engineering and Applications, 2017, 53(6): 111-117.
|
[15] |
JIA Yingying1,2, WANG Jun1,2, WANG Xiaoxuan1,2, ZHANG Xin1,2.
Analysis of multicast routing protocols in wireless sensor networks
[J]. Computer Engineering and Applications, 2017, 53(18): 32-38.
|