| [1] |
ZHANG Zhi, WEI Jia-xin, WANG Lin.
Hybrid encryption design of LoRa data transmission network
[J]. Computer Engineering & Science, 2021, 43(12): 2177-2182.
|
| [2] |
FENG Feng, ZHOU Qing-lei, LI Bin.
HMAC-SHA1 password recovery based on multi-core FPGA
[J]. Computer Engineering & Science, 2020, 42(10高性能专刊): 1859-1868.
|
| [3] |
XIE Qiu-hong.
Exploration on the MOOC construction of “university
computer foundation” course in military academies
#br#
[J]. Computer Engineering & Science, 2019, 41(增刊S1): 124-128.
|
| [4] |
XI Qi,PENG Janshan,ZHU Junhu.
Teaching practice of Network Information
Security Course in small class setting
[J]. Computer Engineering & Science, 2016, 38(增刊): 174-177.
|
| [5] |
HU Xuexian1,LIU Wenfen1,ZHANG Qihui2.
Teaching methods of information theory course
for the information security majors
[J]. Computer Engineering & Science, 2016, 38(增刊): 224-227.
|
| [6] |
ZHENG Haiyan,WU Weituan,ZHANG Ruili.
Construction of a high quality
course:Computer technology
[J]. Computer Engineering & Science, 2016, 38(增刊): 272-275.
|
| [7] |
WAN Xiyuan,WANG Xia.
Computer simulation curriculum
construction in military academies
[J]. Computer Engineering & Science, 2016, 38(增刊): 281-285.
|
| [8] |
FANG Xu,ZHOU Jun,WANG Baoqin.
Information security personnel
training in military academies
[J]. Computer Engineering & Science, 2016, 38(增刊): 321-323.
|
| [9] |
WU Jian,LIU Xin.
A novel method of hiding the injected modules
[J]. J4, 2015, 37(08): 1472-1478.
|
| [10] |
DONG Wei1,SHU Shaoxian1,XU Xiaoping2.
Pratical study on improving software
requirement engineering courses
[J]. J4, 2014, 36(A2): 34-37.
|
| [11] |
BAO Aihua,CHEN Weiwei,LIU Peng,WEN Ai,WANG Zhen.
Content system construction and practice of cloud computing courses
[J]. J4, 2014, 36(A2): 42-45.
|
| [12] |
CHEN Ping,YU Han,ZHAO Min.
Excellent-engineer-training-oriented course construction
of the security of information system
[J]. J4, 2014, 36(A2): 49-51.
|
| [13] |
LU Huidong,HE Le,WANG Xiaowei.
Practical curriculum reform research in
Basic of Information Technology Application
[J]. J4, 2014, 36(A2): 193-196.
|
| [14] |
SONG Jinyu,HAO Wenning,CHEN Gang,LIAO Xianglin.
Study on the application of case study in course construction
[J]. J4, 2014, 36(A2): 250-253.
|
| [15] |
YUAN Zhijian,WANG Jinshuang,CHEN Rong,PAN Lin.
Practical teaching of information security
course based on packet tracer
[J]. J4, 2014, 36(A2): 254-258.
|