| [1] |
HUANG Fengyuan, YANG Yifan, YU Bo, YANG Zhenzhong, CAI Zhiping, HOU Bingnan.
A large-scale scan of IPv6 IP-ID
[J]. Computer Engineering & Science, 2025, 47(8): 1391-1398.
|
| [2] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
| [3] |
LIU Shiwen1,5,MA Duoyao2,4,LEI Cheng1,3,5,YIN Shaodong2,4,ZHANG Hongqi1,5.
An active defense technique based
on network security awareness
[J]. Computer Engineering & Science, 2018, 40(06): 1057-1061.
|
| [4] |
LIU Qiang,CAI Zhi-ping,YIN Jian-ping,DONG De-zun,TANG Yong,ZHANG Yi-ming.
Frameworks and methods of cybersecurity detection
[J]. Computer Engineering & Science, 2017, 39(12): 2224-2229.
|
| [5] |
WU Guo,CHEN Lei,SI Zhi-gang,BAI Li-fang.
An index optimization model for
network security situation evaluation
[J]. Computer Engineering & Science, 2017, 39(05): 861-869.
|
| [6] |
ZHAO Ning1,XIE Shucui2.
Analysis and application of the high performance data
packet capture technology based on dpdk
[J]. Computer Engineering & Science, 2016, 38(11): 2209-2215.
|
| [7] |
WANG Xin,CHEN Shuhui,SU Jinshu.
Design and implementation of a hardware
based large scale Hash flowtable
[J]. Computer Engineering & Science, 2016, 38(10): 1955-1960.
|
| [8] |
REN Fang.
An adaptive distributed private key
generator scheme in Ad Hoc networks
[J]. J4, 2015, 37(07): 1272-1279.
|
| [9] |
CHEN Hongliang,LIU Liping,ZHAO Ming,CHEN Zhigang.
Trust-based management for dynamic
spectrum access in cognitive wireless networks
[J]. J4, 2015, 37(03): 498-502.
|
| [10] |
CHEN Daqian,REN Guangwei.
Reflections on community e-government
network security and data sharing
[J]. J4, 2014, 36(9): 1705-1710.
|
| [11] |
MA Zhanfei1,YIN Chuanzhuo2.
Research of the linkage system of firewall
and intrusion detection system based on ACE and SSL
[J]. J4, 2014, 36(8): 1486-1492.
|
| [12] |
ZHANG Lingtong1,2,LUO Senlin2.
Research of the network covert channel
technique based on TCP protocol header
[J]. J4, 2014, 36(6): 1072-1076.
|
| [13] |
TANG Xiangyan, CHENG Jieren, YIN Jianping, GONG Deliang.
A packet detection method based on Negative Pattern
[J]. Computer Engineering & Science, 2014, 36(11): 2128-2131.
|
| [14] |
ZHANG Yongjun1,2,TANG Jun2.
Analysis and assessment of network
security situation based on cloud model
[J]. J4, 2014, 36(1): 63-67.
|
| [15] |
GAN Liang1,2,LI Runheng1,JIA Yan1,LIU Jian3.
HS-streamCube:Realtime multidimensional
analysis system on network security event stream
[J]. J4, 2013, 35(3): 72-79.
|