[1] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(07): 1229-1236.
|
[2] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[3] |
CAO Shou-qi, HE Xin, LIU Wan-rong.
An improved remote user authentication scheme
[J]. Computer Engineering & Science, 2021, 43(11): 1960-1965.
|
[4] |
CAO Shouqi,SUN Qing,CAO Liling.
An improved identity authentication scheme
of dynamic ID multi-factor remote users
[J]. Computer Engineering & Science, 2019, 41(04): 633-640.
|
[5] |
LIU Shiwen1,5,MA Duoyao2,4,LEI Cheng1,3,5,YIN Shaodong2,4,ZHANG Hongqi1,5.
An active defense technique based
on network security awareness
[J]. Computer Engineering & Science, 2018, 40(06): 1057-1061.
|
[6] |
LIU Qiang,CAI Zhi-ping,YIN Jian-ping,DONG De-zun,TANG Yong,ZHANG Yi-ming.
Frameworks and methods of cybersecurity detection
[J]. Computer Engineering & Science, 2017, 39(12): 2224-2229.
|
[7] |
WU Guo,CHEN Lei,SI Zhi-gang,BAI Li-fang.
An index optimization model for
network security situation evaluation
[J]. Computer Engineering & Science, 2017, 39(05): 861-869.
|
[8] |
ZHAO Ning1,XIE Shucui2.
Analysis and application of the high performance data
packet capture technology based on dpdk
[J]. Computer Engineering & Science, 2016, 38(11): 2209-2215.
|
[9] |
WANG Xin,CHEN Shuhui,SU Jinshu.
Design and implementation of a hardware
based large scale Hash flowtable
[J]. Computer Engineering & Science, 2016, 38(10): 1955-1960.
|
[10] |
LIU Runjie,LIU Hengchao,SHEN Jinyuan.
An improved remote user anonymous
authentication scheme using smart cards
[J]. J4, 2016, 38(03): 465-470.
|
[11] |
REN Fang.
An adaptive distributed private key
generator scheme in Ad Hoc networks
[J]. J4, 2015, 37(07): 1272-1279.
|
[12] |
CHEN Hongliang,LIU Liping,ZHAO Ming,CHEN Zhigang.
Trust-based management for dynamic
spectrum access in cognitive wireless networks
[J]. J4, 2015, 37(03): 498-502.
|
[13] |
TANG Xiangyan, CHENG Jieren, YIN Jianping, GONG Deliang.
A packet detection method based on Negative Pattern
[J]. Computer Engineering & Science, 2014, 36(11): 2128-2131.
|
[14] |
CHEN Daqian,REN Guangwei.
Reflections on community e-government
network security and data sharing
[J]. J4, 2014, 36(09): 1705-1710.
|
[15] |
HUANG Chaoyang,WU Zhengying,LUO Shaolan.
An secure and efficient dynamic password
authentication protocol based on smart card and fingerprint
[J]. J4, 2014, 36(09): 1711-1715.
|