[1] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[2] |
LIU Shiwen1,5,MA Duoyao2,4,LEI Cheng1,3,5,YIN Shaodong2,4,ZHANG Hongqi1,5.
An active defense technique based
on network security awareness
[J]. Computer Engineering & Science, 2018, 40(06): 1057-1061.
|
[3] |
LIU Qiang,CAI Zhi-ping,YIN Jian-ping,DONG De-zun,TANG Yong,ZHANG Yi-ming.
Frameworks and methods of cybersecurity detection
[J]. Computer Engineering & Science, 2017, 39(12): 2224-2229.
|
[4] |
WU Guo,CHEN Lei,SI Zhi-gang,BAI Li-fang.
An index optimization model for
network security situation evaluation
[J]. Computer Engineering & Science, 2017, 39(05): 861-869.
|
[5] |
ZHAO Ning1,XIE Shucui2.
Analysis and application of the high performance data
packet capture technology based on dpdk
[J]. Computer Engineering & Science, 2016, 38(11): 2209-2215.
|
[6] |
WANG Xin,CHEN Shuhui,SU Jinshu.
Design and implementation of a hardware
based large scale Hash flowtable
[J]. Computer Engineering & Science, 2016, 38(10): 1955-1960.
|
[7] |
REN Fang.
An adaptive distributed private key
generator scheme in Ad Hoc networks
[J]. J4, 2015, 37(07): 1272-1279.
|
[8] |
CHEN Hongliang,LIU Liping,ZHAO Ming,CHEN Zhigang.
Trust-based management for dynamic
spectrum access in cognitive wireless networks
[J]. J4, 2015, 37(03): 498-502.
|
[9] |
TANG Xiangyan, CHENG Jieren, YIN Jianping, GONG Deliang.
A packet detection method based on Negative Pattern
[J]. Computer Engineering & Science, 2014, 36(11): 2128-2131.
|
[10] |
CHEN Daqian,REN Guangwei.
Reflections on community e-government
network security and data sharing
[J]. J4, 2014, 36(09): 1705-1710.
|
[11] |
MA Zhanfei1,YIN Chuanzhuo2.
Research of the linkage system of firewall
and intrusion detection system based on ACE and SSL
[J]. J4, 2014, 36(08): 1486-1492.
|
[12] |
ZHANG Lingtong1,2,LUO Senlin2.
Research of the network covert channel
technique based on TCP protocol header
[J]. J4, 2014, 36(06): 1072-1076.
|
[13] |
ZHANG Yongjun1,2,TANG Jun2.
Analysis and assessment of network
security situation based on cloud model
[J]. J4, 2014, 36(01): 63-67.
|
[14] |
GAN Liang1,2,LI Runheng1,JIA Yan1,LIU Jian3.
HS-streamCube:Realtime multidimensional
analysis system on network security event stream
[J]. J4, 2013, 35(3): 72-79.
|
[15] |
WANG Hailong1,2,TANG Yong2,GONG Zhenghu2.
Signature generation model for
botnet command and control channel
[J]. J4, 2013, 35(2): 62-67.
|