[1] |
Li Xuebing, Chen Yang, Zhou Mengying, Wang Xin.
Internet Data Transfer Protocol QUIC: A Survey
[J]. Journal of Computer Research and Development, 2020, 57(9): 1864-1876.
|
[2] |
Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming.
DiffSec: A Differentiated Intelligent Network Security Service Model
[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966.
|
[3] |
Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin.
An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests
[J]. Journal of Computer Research and Development, 2019, 56(3): 566-575.
|
[4] |
Zhang Yuqing, Dong Ying, Liu Caiyun, Lei Kenan, Sun Hongyu.
Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security
[J]. Journal of Computer Research and Development, 2018, 55(6): 1117-1142.
|
[5] |
Zheng Zheng, Xu Mingwei, Li Qi, Zhang Yun.
Defending Against SDN Network Topology Poisoning Attacks
[J]. Journal of Computer Research and Development, 2018, 55(1): 207-215.
|
[6] |
Fu Zhiyao, Gao Ling, Sun Qian, Li Yang, Gao Ni.
Evaluation of Vulnerability Severity Based on Rough Sets and Attributes Reduction
[J]. Journal of Computer Research and Development, 2016, 53(5): 1009-1017.
|
[7] |
Wang Yichuan, Ma Jianfeng, Lu Di,Zhang Liumei,Meng Xianjia.
Game Optimization for Internal DDoS Attack Detection in Cloud Computing
[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882.
|
[8] |
Wen Kun,Yang Jiahai,Cheng Fengjuan,Yin Hui, Wang Jianfeng.
MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network
[J]. Journal of Computer Research and Development, 2015, 52(4): 813-822.
|
[9] |
Xu Qingui, Huang Peican, Yang Taolan.
An Enhanced Biometrics-Key-Based Remote User Authentication Scheme with Smart Card
[J]. Journal of Computer Research and Development, 2015, 52(11): 2645-2655.
|
[10] |
Lin Hui1, Ma Jianfeng2, and Xu Li1.
A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism
[J]. 计算机研究与发展, 2014, 51(7): 1486-1496.
|
[11] |
Zhou Yanwei1,2, Yang Qiliang3, Yang Bo2, and Wu Zhenqiang1,2.
A Tor Anonymous Communication System with Security Enhancements
[J]. 计算机研究与发展, 2014, 51(7): 1538-1546.
|
[12] |
Bu Ning1, Liu Yuling2, Lian Yifeng2, and Huang Liang2.
UML-Based Modeling Method of Network Security Infrastructure
[J]. 计算机研究与发展, 2014, 51(7): 1578-1593.
|
[13] |
Xiao Mingming, and Yu Shunzheng.
Protocol Reverse Engineering Using Grammatical Inference
[J]. , 2013, 50(10): 2044-2058.
|
[14] |
Ye Yun, Xu Xishan, Qi Zhichang, and Wu Xueyang.
Attack Graph Generation Algorithm for Large-Scale Network System
[J]. , 2013, 50(10): 2133-2139.
|
[15] |
Li Peng, Wang Ruchuan, and Wu Ning.
Research on Unknown Malicious Code Automatic Detection Based on Space Relevance Features
[J]. , 2012, 49(5): 949-957.
|