[1] |
YANG Zhengqiu, ZHENG Yifan, XIU Jiapeng.
Research on Security System for Internet of Vehicles Based on Digital Signature
[J]. Computer Engineering and Applications, 2022, 58(9): 116-126.
|
[2] |
LIANG Guangjun, XIN Jianfang, WANG Qun, NI Xueli, GUO Xiangmin, XIA Lingling.
Survey of IoT Forensics
[J]. Computer Engineering and Applications, 2022, 58(8): 12-32.
|
[3] |
LIAO Haode, ZOU Xiaofeng, WANG Bing, XIAO Ciyuan.
Fuzzy Random Proof of Work Consensus Algorithm
[J]. Computer Engineering and Applications, 2022, 58(7): 137-141.
|
[4] |
ZHANG Hao, ZHANG Xiaoyu, ZHANG Zhenyou, LI Wei.
Summary of Intrusion Detection Models Based on Deep Learning
[J]. Computer Engineering and Applications, 2022, 58(6): 17-28.
|
[5] |
LI Fujuan, WANG Qun.
Research on Cyber Ranges and Its Key Technologies
[J]. Computer Engineering and Applications, 2022, 58(5): 12-22.
|
[6] |
WANG Mengting, WANG Wei, ZHANG Qiang, LIU Momeng.
Vehicular Network Message Authentication Technology Based on Proxy Vehicle
[J]. Computer Engineering and Applications, 2022, 58(5): 131-137.
|
[7] |
LIU Fasheng, SUN Qixuan, LI Jianghua.
Fusion of Double Block Chain Credit Data Storage and Query Scheme
[J]. Computer Engineering and Applications, 2022, 58(2): 123-128.
|
[8] |
ZHOU Huiying, WANG Tinghua, ZHANG Daili.
Research Progress of Multi-Label Feature Selection
[J]. Computer Engineering and Applications, 2022, 58(15): 52-67.
|
[9] |
KANG Peng, YANG Wenzhong, MA Hongqiao.
TLS Malicious Encrypted Traffic Identification Research
[J]. Computer Engineering and Applications, 2022, 58(12): 1-11.
|
[10] |
ZHANG Ran, PAN Zhihan, YIN Yifeng, CAI Zengyu.
Network Security Situation Assessment Model Based on SAA-SSA-BPNN
[J]. Computer Engineering and Applications, 2022, 58(11): 117-124.
|
[11] |
ZHANG Yaling, QU Lingyu.
Differential Privacy Protection [k]-means Algorithm Based on BWP Index
[J]. Computer Engineering and Applications, 2022, 58(10): 108-115.
|
[12] |
SHENG Jianhui, FAN Yinting, XIA Minjie.
Physical Layer Security Performance Analysis for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2021, 57(8): 91-95.
|
[13] |
ZONG Xiaoping, TAO Zeze.
Knowledge Tracing Model Based on Mastery Speed
[J]. Computer Engineering and Applications, 2021, 57(6): 117-123.
|
[14] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[15] |
HUI Hui, GOU Bo, WANG Ying.
Secure Transmission Scheme for Successive Relaying Networks Under Eavesdropping Environment
[J]. Computer Engineering and Applications, 2021, 57(4): 77-82.
|