| [1] |
ZHANG Yufeng,LOU Fang,ZHANG Li.
Security assessment of web applications
based on software attack surface
[J]. J4, 20160101, 38(01): 73-77.
|
| [2] |
HUANG Fengyuan, YANG Yifan, YU Bo, YANG Zhenzhong, CAI Zhiping, HOU Bingnan.
A large-scale scan of IPv6 IP-ID
[J]. Computer Engineering & Science, 2025, 47(8): 1391-1398.
|
| [3] |
LIU Hui1, 2, HOU Tongding1, 2, ZHAO Bo3, 4, GUO Hanbin1, 2.
Survey of fuzzing test case generation techniques
[J]. Computer Engineering & Science, 2025, 47(7): 1244-1261.
|
| [4] |
LI Junzhe, FU Zhenxin, YANG Honghui, MA Yinping, LI Ruomiao, FAN Chun, .
Design and implementation of a cross-cluster data migration system for computational networks
[J]. Computer Engineering & Science, 2025, 47(5): 775-786.
|
| [5] |
XIAO Di, YU Zhu-yang, LI Min, WANG Lian.
A secure federated learning scheme based on differential privacy and model clustering
[J]. Computer Engineering & Science, 2024, 46(9): 1606-1615.
|
| [6] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(7): 1229-1236.
|
| [7] |
XUN Peng, CHEN Hong-yan, WANG Yong-zhi, LI Shi-jie.
An intrinsic secure open shortest path first protocol based on identity cryptography
[J]. Computer Engineering & Science, 2024, 46(6): 1022-1031.
|
| [8] |
GUO Chen-liang, YAN Shao-hong, ZONG Chen-qi.
Research on parallel acceleration of line cloud privacy attack algorithm
[J]. Computer Engineering & Science, 2024, 46(4): 615-625.
|
| [9] |
LI Yang, YIN Da-peng, MA Zi-qiang , YAO Zi-hao, WEI Liang-gen, .
Cache side-channel attack detection combining decision tree and AdaBoost
[J]. Computer Engineering & Science, 2024, 46(3): 440-452.
|
| [10] |
HAN Xiao-xuan, ZHOU Wen-an, HAN Zhen.
Vulnerability analysis and verification of 5G-AKA authentication mechanism
[J]. Computer Engineering & Science, 2024, 46(12): 2149-2157.
|
| [11] |
SHEN Fan-fan, TANG Xing-yi, ZHANG Jun, XU Chao, CHEN Yong, HE Yan-xiang.
Malicious behavior detection method based on iFA and improved LSTM network
[J]. Computer Engineering & Science, 2024, 46(12): 2158-2170.
|
| [12] |
XIA Ge-ming, YU Chao-dong, CHEN Jian.
Trust problems in edge computing:Challenges and reviews
[J]. Computer Engineering & Science, 2023, 45(8): 1393-1404.
|
| [13] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(3): 434-442.
|
| [14] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(2): 277-285.
|
| [15] |
XU Cheng-zhou, WANG Chen, ZHANG Wen-tao.
A time factor based revocable and traceable attribute-based encryption scheme
[J]. Computer Engineering & Science, 2023, 45(2): 286-294.
|