[1] |
LI Fujuan, WANG Qun.
Research on Cyber Ranges and Its Key Technologies
[J]. Computer Engineering and Applications, 2022, 58(5): 12-22.
|
[2] |
LIU Chengshi, ZHAO Zhigang, LI Qiang, LV Huixian, DONG Xiaochen, LI Jinxia.
Enhanced Low-Rank Representation Image Denoising Algorithm
[J]. Computer Engineering and Applications, 2020, 56(2): 216-225.
|
[3] |
SHI Jiawen, WANG Yang, ZHANG Geng, WANG Yanan.
Distributed Simulation System for Power Communication Network
[J]. Computer Engineering and Applications, 2019, 55(19): 246-252.
|
[4] |
LIANG Chengjun, JIANG Hao, WU Jing.
Efficient mechanism for network simulation scenario modeling based on unified description
[J]. Computer Engineering and Applications, 2018, 54(7): 127-131.
|
[5] |
LIU Kaiyu1, LIU Yuan1, WANG Xiaofeng2.
Method of network traffic simulation for topology focusing
[J]. Computer Engineering and Applications, 2016, 52(23): 123-129.
|
[6] |
WU Chenwen, RU Junnian, LIU Xiangli, LI Zhichang.
Algorithm of multicast network topology inference based on packet loss rate
[J]. Computer Engineering and Applications, 2014, 50(13): 118-120.
|
[7] |
CHEN Shiwen, GUO Tong, HUANG Wanwei.
DDoS attack detection based on fast fractional Fourier transform
[J]. Computer Engineering and Applications, 2013, 49(24): 4-7.
|
[8] |
GAO Yuan, JIANG Ming, GE Yuan.
Simulation of DC motor networked control system based on NS2
[J]. Computer Engineering and Applications, 2013, 49(21): 83-86.
|
[9] |
REN Yilong1, LIU Yuan1,2.
Detecting method for DDoS attack based on wavelet analysis
[J]. Computer Engineering and Applications, 2012, 48(31): 82-88.
|
[10] |
NING Peixing, HUANG Ren.
Faster fractal image compression based on characteristics of mathematical statistics
[J]. Computer Engineering and Applications, 2012, 48(31): 161-165.
|
[11] |
WANG Xiaofeng1, GUAN Lu1, LIU Yuan2.
High performance network simulation method based on topology abstraction
[J]. Computer Engineering and Applications, 2012, 48(29): 82-88.
|
[12] |
ZHOU Zhengji, GUO Ling, XU Jing.
Implementation of self-similar network traffic simulation system on cluster
[J]. Computer Engineering and Applications, 2012, 48(25): 105-111.
|
[13] |
LI Yihong1,2, LU Zhaoyang1, LI Taijun2.
New pearl shape symmetry detection algorithm
[J]. Computer Engineering and Applications, 2012, 48(24): 37-40.
|
[14] |
XU Xing, YUE Xuejun, LIN Tao.
Research on queuing model of self-similar network based on hyper-erlang distribution
[J]. Computer Engineering and Applications, 2012, 48(18): 71-75.
|
[15] |
WANG Lintao,ZHANG Xinyou.
Design and simulation of self-adapting gateway for AODV
[J]. Computer Engineering and Applications, 2011, 47(8): 96-99.
|