[1] |
Li Xuebing, Chen Yang, Zhou Mengying, Wang Xin.
Internet Data Transfer Protocol QUIC: A Survey
[J]. Journal of Computer Research and Development, 2020, 57(9): 1864-1876.
|
[2] |
Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming.
DiffSec: A Differentiated Intelligent Network Security Service Model
[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966.
|
[3] |
Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin.
An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests
[J]. Journal of Computer Research and Development, 2019, 56(3): 566-575.
|
[4] |
Huang Huafeng, Wang Jiajie, Yang Yi, Su Purui, Nie Chujiang, Xin Wei.
Automatic Software Vulnerability Discovery and Exploit Under the Limited Resource Conditions
[J]. Journal of Computer Research and Development, 2019, 56(11): 2299-2314.
|
[5] |
Zhang Lei, Yang Zhemin, Li Mingqi, Yang Min.
TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance
[J]. Journal of Computer Research and Development, 2019, 56(11): 2315-2329.
|
[6] |
Xie Qin, Zhang Qinghua, Wang Guoyin.
An Adaptive Three-way Spam Filter with Similarity Measure
[J]. Journal of Computer Research and Development, 2019, 56(11): 2410-2423.
|
[7] |
Zhao Shangru, Li Xuejun, Fang Yue, Yu Yuanping, Huang Weihao, Chen Kai, Su Purui, Zhang Yuqing.
A Survey on Automated Exploit Generation
[J]. Journal of Computer Research and Development, 2019, 56(10): 2097-2111.
|
[8] |
Zhang Yuqing, Dong Ying, Liu Caiyun, Lei Kenan, Sun Hongyu.
Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security
[J]. Journal of Computer Research and Development, 2018, 55(6): 1117-1142.
|
[9] |
Wu Weizhi, Yang Li, Tan Anhui, Xu Youhong.
Granularity Selections in Generalized Incomplete Multi-Granular Labeled Decision Systems
[J]. Journal of Computer Research and Development, 2018, 55(6): 1263-1272.
|
[10] |
Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke.
Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN
[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268.
|
[11] |
Zheng Zheng, Xu Mingwei, Li Qi, Zhang Yun.
Defending Against SDN Network Topology Poisoning Attacks
[J]. Journal of Computer Research and Development, 2018, 55(1): 207-215.
|
[12] |
Lei Kenan, Zhang Yuqing, Wu Chensi, Ma Hua.
A System for Scoring the Exploitability of Vulnerability Based Types
[J]. Journal of Computer Research and Development, 2017, 54(10): 2296-2309.
|
[13] |
Fu Xiuwen, Li Wenfeng, Duan Ying.
Invulnerability of Clustering Wireless Sensor Network Towards Cascading Failures
[J]. Journal of Computer Research and Development, 2016, 53(12): 2882-2892.
|
[14] |
Deng Dayong, Miao Duoqian, Huang Houkuan.
Analysis of Concept Drifting and Uncertainty in an Information Table
[J]. Journal of Computer Research and Development, 2016, 53(11): 2607-2612.
|
[15] |
Chang Qing, Liu Zhongjin, Wang Mengtao, Chen Yu, Shi Zhiqiang, Sun Limin.
VDNS: An Algorithm for Cross-Platform Vulnerability Searching in Binary Firmware
[J]. Journal of Computer Research and Development, 2016, 53(10): 2288-2298.
|