计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
  Office Online
  Journal Online
   Forthcoming Articles
   Advanced Search
   Archive
   Read Articles
   Download Articles
   Email Alert
   
  Download
 
 
 
 
 
 
More>>  
 
Other articles related with "TP393":
2330 Shi Leyi, Zhu Hongqiang, Liu Yihao, Liu Jia
  Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM
    Journal of Computer Research and Development   2019 Vol.56 (11): 2330-2338 [Abstract] (142) [HTML 1 KB] [PDF 1271 KB] (179)
2339 Liu Yashu, Wang Zhihai, Hou Yueran, Yan Hanbing
  A Method of Extracting Malware Features Based on Probabilistic Topic Model
    Journal of Computer Research and Development   2019 Vol.56 (11): 2339-2348 [Abstract] (124) [HTML 1 KB] [PDF 1386 KB] (156)
2494 Li Jie, Hong Tao, Wang Xingwei, Huang Min, Guo Jing
  A Data Dissemination Mechanism Based on Group Structure in Opportunistic Mobile Social Networks
    Journal of Computer Research and Development   2019 Vol.56 (11): 2494-2505 [Abstract] (88) [HTML 1 KB] [PDF 1558 KB] (79)
2151 Wang Yue, Fan Kai
  Effective CP-ABE with Hidden Access Policy
    Journal of Computer Research and Development   2019 Vol.56 (10): 2151-2159 [Abstract] (115) [HTML 1 KB] [PDF 1215 KB] (85)
2262 Liu Xuehua, Ding Liping, Liu Wenmao, Zheng Tao, Li Yanfeng, Wu Jingzheng
  A Cloud Forensics Method Based on SDS and Cloud Forensics Trend Analysis
    Journal of Computer Research and Development   2019 Vol.56 (10): 2262-2276 [Abstract] (53) [HTML 1 KB] [PDF 1655 KB] (64)
1918 Tu Panpeng, Wang Xingwei, Li Jie, Huang Min
  BIRI: A BBO-Inspired MSN Routing Algorithm with Information-Centric Paradigm Support
    Journal of Computer Research and Development   2019 Vol.56 (9): 1918-1926 [Abstract] (60) [HTML 1 KB] [PDF 913 KB] (62)
1939 Liu Bo, Li Yang, Meng Qing, Tang Xiaohu, Cao Jiuxin
  Evaluation of Content Credibility in Social Media
    Journal of Computer Research and Development   2019 Vol.56 (9): 1939-1952 [Abstract] (55) [HTML 1 KB] [PDF 1088 KB] (66)
1953 Liu Liu, Wang Yuyao, Ni Qixuan, Cao Jie, Bu Zhan
  A Link Prediction Approach in Temporal Networks Based on Game Theory
    Journal of Computer Research and Development   2019 Vol.56 (9): 1953-1964 [Abstract] (62) [HTML 1 KB] [PDF 2234 KB] (68)
1965 Wu Hua, Wang Ling, Cheng Guang
  Optimization of TCP Congestion Control Algorithm in Dynamic Adaptive Streaming over HTTP
    Journal of Computer Research and Development   2019 Vol.56 (9): 1965-1976 [Abstract] (47) [HTML 1 KB] [PDF 4437 KB] (125)
1587 Wang Jiye, Zhou Biyu, Zhang Fa, Shi Xiang, Zeng Nan, Liu Zhiyong
  Data Center Energy Consumption Models and Energy Efficient Algorithms
    Journal of Computer Research and Development   2019 Vol.56 (8): 1587-1603 [Abstract] (319) [HTML 140 KB] [PDF 1055 KB] (254)
1470 Feng Xinyue, Yang Qiusong, Shi Lin, Wang Qing, Li Mingshu
  Critical Memory Data Access Monitor Based on Dynamic Strategy Learning
    Journal of Computer Research and Development   2019 Vol.56 (7): 1470-1487 [Abstract] (76) [HTML 108 KB] [PDF 1478 KB] (45)
1219 He Rongxi, Lei Tianying, Lin Ziwei
  Multi-Constrained Energy-Saving Routing Algorithm in Software-Defined Data Center Networks
    Journal of Computer Research and Development   2019 Vol.56 (6): 1219-1230 [Abstract] (65) [HTML 90 KB] [PDF 3038 KB] (104)
1252 Li Zhen, Tang Zhanyong, Li Zhengqiao, Wang Hai, Gong Xiaoqing, Chen Feng, Chen Xiaojiang, Fang Dingyi
  An Automatic Detection Method for Privacy Leakage Across Application Components
    Journal of Computer Research and Development   2019 Vol.56 (6): 1252-1262 [Abstract] (63) [HTML 69 KB] [PDF 1171 KB] (63)
1275 Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei
  Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events
    Journal of Computer Research and Development   2019 Vol.56 (6): 1275-1289 [Abstract] (62) [HTML 157 KB] [PDF 1140 KB] (54)
909 Zhang Long, Wang Jinsong
  DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
    Journal of Computer Research and Development   2019 Vol.56 (5): 909-918 [Abstract] (244) [HTML 61 KB] [PDF 2034 KB] (237)
919 Chen Li, Deng Kun,Jiang Tao,Yue Guangxue,Li Panpan,Yang Jun, Xu Xubao
  Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests
    Journal of Computer Research and Development   2019 Vol.56 (5): 919-928 [Abstract] (121) [HTML 77 KB] [PDF 2908 KB] (125)
929 Wang Shuo, Wang Jianhua, Tang Guangming, Pei Qingqi, Zhang Yuchen, Liu Xiaohu
  Intelligent and Efficient Method for Optimal Penetration Path Generation
    Journal of Computer Research and Development   2019 Vol.56 (5): 929-941 [Abstract] (120) [HTML 100 KB] [PDF 3954 KB] (143)
942 Yang Junnan, Zhang Hongqi, Zhang Chuanfu
  Network Defense Decision-Making Method Based on Stochastic Game and Improved WoLF-PHC
    Journal of Computer Research and Development   2019 Vol.56 (5): 942-954 [Abstract] (144) [HTML 128 KB] [PDF 4280 KB] (125)
967 Fei Ning, Xu Lijie, Cheng Xiaohui
  Implementation and Evaluation of Cooperative Routing in Software Defined Wireless Networking
    Journal of Computer Research and Development   2019 Vol.56 (5): 967-976 [Abstract] (94) [HTML 59 KB] [PDF 1947 KB] (87)
1048 Xi Liang, Wang Yong, Zhang Fengbin
  Anomaly Detection Algorithm Based on FCM with Adaptive Artificial Fish-Swarm
    Journal of Computer Research and Development   2019 Vol.56 (5): 1048-1059 [Abstract] (86) [HTML 100 KB] [PDF 3003 KB] (103)
453 Shi Yahu, Shi Hailong, Cui Li
  EasiDARM: Distributed Based Adaptive Register Method for Internet of Things
    Journal of Computer Research and Development   2019 Vol.56 (3): 453-466 [Abstract] (93) [HTML 104 KB] [PDF 4936 KB] (67)
467 Li Mingyue, Luo Xiangyang, Chai Lixiang, Yuan Fuxiang, GanYong
  City-Level IP Geolocation Method Based on Network Node Clustering
    Journal of Computer Research and Development   2019 Vol.56 (3): 467-479 [Abstract] (123) [HTML 69 KB] [PDF 4791 KB] (89)
533 Wu Jiaxin, Wu Jigang, Chen Long, Sui Xiufeng
  Secrecy Capacity Optimization Technique for Energy Harvest Cooperative Cognitive Radio Network
    Journal of Computer Research and Development   2019 Vol.56 (3): 533-543 [Abstract] (79) [HTML 100 KB] [PDF 3187 KB] (49)
566 Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin
  An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests
    Journal of Computer Research and Development   2019 Vol.56 (3): 566-575 [Abstract] (101) [HTML 66 KB] [PDF 2117 KB] (87)
576 Zhang Shaobo, Wang Guojun, Liu Qin, Liu Jianxun
  Trajectory Privacy Protection Method Based on Multi-Anonymizer
    Journal of Computer Research and Development   2019 Vol.56 (3): 576-584 [Abstract] (91) [HTML 87 KB] [PDF 2532 KB] (70)
585 Lin Weiwei, Yao Yingbiao, Zou Ke, Feng Wei, Yan Junrong
  Correction Vector Based Distributed DV-Hop Localization Refinement Algorithm
    Journal of Computer Research and Development   2019 Vol.56 (3): 585-593 [Abstract] (91) [HTML 61 KB] [PDF 2417 KB] (50)
349 Li Chunqiang, Dong Yongqiang, Wu Guoxin
  Elephant Flow Detection Algorithm Based on Lowest Rate Eviction Integrated with d-Left Hash
    Journal of Computer Research and Development   2019 Vol.56 (2): 349-362 [Abstract] (181) [HTML 103 KB] [PDF 5967 KB] (135)
363 Wei Songjie, Wu Chao, Luo Na, Zhang Gongxuan
  Traffic Latency Characterization and Fingerprinting in Mobile Cellular Networks
    Journal of Computer Research and Development   2019 Vol.56 (2): 363-374 [Abstract] (155) [HTML 84 KB] [PDF 3228 KB] (159)
90 Xu Zhiwei, Zeng Chen, Chao Lu, Peng Xiaohui
  Zone-Oriented Architecture: An Architectural Style for Smart Web of Everything
    Journal of Computer Research and Development   2019 Vol.56 (1): 90-102 [Abstract] (303) [HTML 88 KB] [PDF 3814 KB] (282)
2620 Wang Shuo, Tang Guangming , Wang Jianhua, Sun Yifeng, Kou Guang
  Attack Scenario Construction Method Based on Causal Knowledge Net
    Journal of Computer Research and Development   2018 Vol.55 (12): 2620-2636 [Abstract] (193) [HTML 112 KB] [PDF 3673 KB] (180)
First page | Prev page | Next page | Last pagePage 1 of 8, 214 records
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech