[1] |
WANG Tong, ZHU Minling.
Study on Fast Realization of Serial Test and Approximate Entropy Test
[J]. Computer Engineering and Applications, 2020, 56(15): 113-117.
|
[2] |
ZHAO Ying1, PAN Hua2, SUN Jinyan2, MO Qi3, DAI Fei4.
Random Behavior Analysis Method of Collaborative Business Process
[J]. Computer Engineering and Applications, 2019, 55(3): 245-251.
|
[3] |
LV Congdong.
Relation between IP-secure and TA-secure in intransitive non-interference
[J]. Computer Engineering and Applications, 2018, 54(8): 78-84.
|
[4] |
XU Guoyu, MIAO Xuna, ZHANG Junfeng, JIANG Tao, MA Xiaofei.
Review of implicit authentication for mobile devices
[J]. Computer Engineering and Applications, 2018, 54(6): 19-25.
|
[5] |
ZHAO Hongda, QI Yong, LI Qianmu.
Ubiquitous network security risk assessment modeling based on COOPN
[J]. Computer Engineering and Applications, 2018, 54(4): 122-127.
|
[6] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[7] |
CHENG Tengteng, FANG Xianwen, WANG Lili, LIU Xiangwei.
Business process mining based on feature nets and module nets
[J]. Computer Engineering and Applications, 2017, 53(20): 237-242.
|
[8] |
GUAN Xin, GUO Junping, WANG Xing.
Double fuzzy information security evaluation algorithm based on improved DS theory
[J]. Computer Engineering and Applications, 2017, 53(2): 112-117.
|
[9] |
CHEN Yu, WANG Yadi, WANG Jindong, LI Tao.
Study of influence on information security risks by delays of security measures
[J]. Computer Engineering and Applications, 2017, 53(19): 118-123.
|
[10] |
LIN Xianning.
Selection method of information security system based on hesitant linguistic Heronian geometric operator
[J]. Computer Engineering and Applications, 2017, 53(13): 174-180.
|
[11] |
LU Yang, GAO Bao.
Research on file integrity checking based on CityHash for e-government websites
[J]. Computer Engineering and Applications, 2016, 52(4): 104-109.
|
[12] |
LI Kun, YU Junhe, ZHAN Hongfei.
Data-driven differential behavior analysis for individual operator during execution of business process
[J]. Computer Engineering and Applications, 2016, 52(19): 84-89.
|
[13] |
DENG Zhidan, YANG Haiyan, WU Ji.
Test data generation and selection approach for Web application based on constraint-solving
[J]. Computer Engineering and Applications, 2016, 52(18): 214-221.
|
[14] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[15] |
YAN Ying1, YUAN Ming1, HE Xiaolan1, SUO Bin2.
Risk evaluation for inventory financing before loans based on D-S evidence theory
[J]. Computer Engineering and Applications, 2015, 51(13): 239-244.
|