[1] |
ZHU Ming1,YIN Jianping1,CHENG Jieren1,2,LIU Qiang1,LIN Jiarun1.
A Method of Generating the MultiTargets Attack Graphs Based on Greedy Policies
[J]. J4, 2010, 32(6): 22-25.
|
[2] |
LIN Jiarun1,YIN Jianping1,CHENG Jieren1,2,LONG Jun1,ZHU Ming1.
Research on the MultiSensor Data Fusion Technology for Network Security
[J]. J4, 2010, 32(6): 30-33.
|
[3] |
SHEN Xueli,ZHANG Jisuo.
Reserch of Intrusion Detection Based on the BP Networks and the Improved PSO Algorithm
[J]. J4, 2010, 32(6): 34-36.
|
[4] |
SUN Ningqing.
Based on Neural Networks and the CFSBased Feature Selection
[J]. J4, 2010, 32(6): 37-39.
|
[5] |
WANG Haiyan,HU Ling,WANG Ruchuan.
A Trust Mechanism Based on the Trust Vector in the P2P Environment
[J]. J4, 2010, 32(5): 6-9.
|
[6] |
ZHANG Nan,ZHANG Jianhua,CHEN Jianying.
An Intrusion Detection Mechanism Based on Immune MultiAgents in WSN
[J]. J4, 2010, 32(5): 10-14.
|
[7] |
SUN Bocheng,QIU Yanjun,LIANG Shiqing.
A Distributed Intrusion Detection and Decision System Based on MobileAgents
[J]. J4, 2010, 32(5): 15-17.
|
[8] |
ZHANG Hongli,HUANG Shouming.
A Mobile AgentBased IDS for Wireless Sensor Networks
[J]. J4, 2010, 32(5): 18-20.
|
[9] |
LU Linlin,MA Xin.
A System Model for the United Risk Assessment of Network Security Based on Mobile Agents
[J]. J4, 2010, 32(5): 26-29.
|
[10] |
CHENG Jie-Ren, YAN Jian-Ping, LIU Yun, LIU Xiang-Hui, CAI Zhi-Ping.
The DDoS Detection Method Based on Attack Features and the ARMA Prediction Model
[J]. J4, 2010, 32(4): 1-4.
|
[11] |
ZHANG Qiang-,Zhuo-Ying, GONG Zheng-Hu.
Research on the Representation and Evolvement of Trust in Distributed Network Interaction
[J]. J4, 2010, 32(4): 5-9.
|
[12] |
FU Hong,XIONG Juan,FU Ming.
Research on the Trust Path Based on an Improved Evolutionary Algorithm
[J]. J4, 2010, 32(4): 22-24.
|
[13] |
HUANG Gu,MIAO Li, ZHANG Da fang.
Formal Verification of the 802.11i Authentication Protocols by Model Checking
[J]. J4, 2010, 32(4): 25-28.
|
[14] |
DENG Hui,LIANG Bo,WANG Feng.
A Dynamic Protocol Detection Techniquefor the Signature Based on Optimizing the MultiPattern Matching Algorithms
[J]. J4, 2010, 32(4): 36-38.
|
[15] |
TU Jie, LI Zhou-Jun, ZHANG Chong-Bin, LI Jiang.
Research on the Scenario of the Active Scanning of Web Vulnerability
[J]. J4, 2010, 32(3): 31-34.
|