[1] |
ZHU Ming1,YIN Jianping1,CHENG Jieren1,2,LIU Qiang1,LIN Jiarun1.
A Method of Generating the MultiTargets Attack Graphs Based on Greedy Policies
[J]. J4, 2010, 32(6): 22-25.
|
[2] |
SHEN Xueli,ZHANG Jisuo.
Reserch of Intrusion Detection Based on the BP Networks and the Improved PSO Algorithm
[J]. J4, 2010, 32(6): 34-36.
|
[3] |
SUN Bocheng,QIU Yanjun,LIANG Shiqing.
A Distributed Intrusion Detection and Decision System Based on MobileAgents
[J]. J4, 2010, 32(5): 15-17.
|
[4] |
ZHANG Hongli,HUANG Shouming.
A Mobile AgentBased IDS for Wireless Sensor Networks
[J]. J4, 2010, 32(5): 18-20.
|
[5] |
LU Linlin,MA Xin.
A System Model for the United Risk Assessment of Network Security Based on Mobile Agents
[J]. J4, 2010, 32(5): 26-29.
|
[6] |
CHENG Jie-Ren, YAN Jian-Ping, LIU Yun, LIU Xiang-Hui, CAI Zhi-Ping.
The DDoS Detection Method Based on Attack Features and the ARMA Prediction Model
[J]. J4, 2010, 32(4): 1-4.
|
[7] |
ZHANG Qiang-,Zhuo-Ying, GONG Zheng-Hu.
Research on the Representation and Evolvement of Trust in Distributed Network Interaction
[J]. J4, 2010, 32(4): 5-9.
|
[8] |
TU Jie, LI Zhou-Jun, ZHANG Chong-Bin, LI Jiang.
Research on the Scenario of the Active Scanning of Web Vulnerability
[J]. J4, 2010, 32(3): 31-34.
|
[9] |
SU Pan-Jun, CHEN Gang, LIU Cuan.
Anomaly Detection Based on Aggregated Network Behavior Metrics
[J]. J4, 2010, 32(3): 38-41.
|
[10] |
QIAO Tong-Xu, LI Guo-Huan, ZHANG Wen-Zheng.
Hierarchical Secure Communications in Computer Networks
[J]. J4, 2010, 32(2): 49-52.
|
[11] |
MA Dun, CA Kai-Yu, CAO Hua-Yang, LIU Xin.
Design and Implementation of a MultiLevel InterDomain Routing Security Monitoring System
[J]. J4, 2010, 32(2): 60-62.
|
[12] |
GUO You-Yan, DU Ye, WANG Yang, HAN Xiang-Fei, SUN Yi, CHEN Ji, JIANG Lin.
Research on an Innernet Access Control System Based on the ARP Protocol
[J]. J4, 2010, 32(1): 21-24.
|
[13] |
.
[J]. J4, 2002, 24(6): 7-10.
|
[14] |
.
[J]. J4, 2002, 24(6): 20-22.
|
[15] |
.
[J]. J4, 2002, 24(6): 27-31.
|