[1] |
ZHANG Yufeng,LOU Fang,ZHANG Li.
Security assessment of web applications
based on software attack surface
[J]. J4, 20160101, 38(01): 73-77.
|
[2] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(07): 1229-1236.
|
[3] |
XUN Peng, CHEN Hong-yan, WANG Yong-zhi, LI Shi-jie.
An intrinsic secure open shortest path first protocol based on identity cryptography
[J]. Computer Engineering & Science, 2024, 46(06): 1022-1031.
|
[4] |
GUO Chen-liang, YAN Shao-hong, ZONG Chen-qi.
Research on parallel acceleration of line cloud privacy attack algorithm
[J]. Computer Engineering & Science, 2024, 46(04): 615-625.
|
[5] |
LI Yang, YIN Da-peng, MA Zi-qiang , YAO Zi-hao, WEI Liang-gen, .
Cache side-channel attack detection combining decision tree and AdaBoost
[J]. Computer Engineering & Science, 2024, 46(03): 440-452.
|
[6] |
XIA Ge-ming, YU Chao-dong, CHEN Jian.
Trust problems in edge computing:Challenges and reviews
[J]. Computer Engineering & Science, 2023, 45(08): 1393-1404.
|
[7] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|
[8] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[9] |
XU Cheng-zhou, WANG Chen, ZHANG Wen-tao.
A time factor based revocable and traceable attribute-based encryption scheme
[J]. Computer Engineering & Science, 2023, 45(02): 286-294.
|
[10] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(01): 77-84.
|
[11] |
WANG Ke-ke, GUO Li-li, LANG Jing-hong.
A security index system of security risk assessment behavior based on STAMP model
[J]. Computer Engineering & Science, 2022, 44(08): 1372-1381.
|
[12] |
CHE Sheng-bing, ZHANG Guang-lin .
Webshell detection based on deep learning
[J]. Computer Engineering & Science, 2022, 44(06): 994-1002.
|
[13] |
ZHENG Si-fei, FENG Zi-jing, LIU Cheng-yu, CHEN Ri-qing, LIU Xiao-long.
An image camouflage encryption method based on vector quantization in cloud storage environment
[J]. Computer Engineering & Science, 2022, 44(06): 1030-1036.
|
[14] |
CHEN Xiang-guo, SHANG Fan, SONG Jun-qiang.
Comparison among embedded system security protection schemes and their application case analysis
[J]. Computer Engineering & Science, 2022, 44(03): 417-426.
|
[15] |
ZHANG Zhi, WEI Jia-xin, WANG Lin.
Hybrid encryption design of LoRa data transmission network
[J]. Computer Engineering & Science, 2021, 43(12): 2177-2182.
|