[1] |
Zu Jiachen, Hu Guyu, Yan Jiajie, Li Shiji.
Resource Management of Service Function Chain in NFV Enabled Network: A Survey
[J]. Journal of Computer Research and Development, 2021, 58(1): 137-152.
|
[2] |
Li Xuebing, Chen Yang, Zhou Mengying, Wang Xin.
Internet Data Transfer Protocol QUIC: A Survey
[J]. Journal of Computer Research and Development, 2020, 57(9): 1864-1876.
|
[3] |
Xu Zhiwei, Wang Yifan, Zhao Yongwei, Li Chundian.
Computation Protocols: Analyzable Abstractions for Computing Systems
[J]. Journal of Computer Research and Development, 2020, 57(5): 897-905.
|
[4] |
Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin.
An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests
[J]. Journal of Computer Research and Development, 2019, 56(3): 566-575.
|
[5] |
Zhang Yuqing, Dong Ying, Liu Caiyun, Lei Kenan, Sun Hongyu.
Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security
[J]. Journal of Computer Research and Development, 2018, 55(6): 1117-1142.
|
[6] |
Zhou Weilin, Yang Yuan, Xu Mingwei.
Network Function Virtualization Technology Research
[J]. Journal of Computer Research and Development, 2018, 55(4): 675-688.
|
[7] |
Wang Yuwei, Liu Min, Ma Cheng, Li Pengfei.
High Performance Load Balancing Mechanism for Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 689-703.
|
[8] |
Wang Junxiao, Qi Heng, Li Keqiu, Zhou Xiaobo.
Real-Time Link Fault Detection as a Service for Datacenter Network
[J]. Journal of Computer Research and Development, 2018, 55(4): 704-716.
|
[9] |
Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong.
Delay-Aware Resource Scheduling Optimization in Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747.
|
[10] |
Huang Rui, Zhang Hongqi, Chang Dexian.
A Backup and Recovery Mechanism for Security Service Chain Fault in Network Function Virtualization Environment
[J]. Journal of Computer Research and Development, 2018, 55(4): 768-781.
|
[11] |
Zheng Zheng, Xu Mingwei, Li Qi, Zhang Yun.
Defending Against SDN Network Topology Poisoning Attacks
[J]. Journal of Computer Research and Development, 2018, 55(1): 207-215.
|
[12] |
Tai Dongzhe, Zhang Ting, Liu Bin.
The Pseudo Congestion of TCP in Software-Defined Networking
[J]. Journal of Computer Research and Development, 2017, 54(1): 192-201.
|
[13] |
Fu Zhiyao, Gao Ling, Sun Qian, Li Yang, Gao Ni.
Evaluation of Vulnerability Severity Based on Rough Sets and Attributes Reduction
[J]. Journal of Computer Research and Development, 2016, 53(5): 1009-1017.
|
[14] |
Wang Yichuan, Ma Jianfeng, Lu Di,Zhang Liumei,Meng Xianjia.
Game Optimization for Internal DDoS Attack Detection in Cloud Computing
[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882.
|
[15] |
Wen Kun,Yang Jiahai,Cheng Fengjuan,Yin Hui, Wang Jianfeng.
MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network
[J]. Journal of Computer Research and Development, 2015, 52(4): 813-822.
|