[1] |
Wu Zhijun, Zhang Rudan, Yue Meng.
A Method for Joint Detection of Attacks in Named Data Networking
[J]. Journal of Computer Research and Development, 2021, 58(3): 569-582.
|
[2] |
Feng Qi, He Debiao, Luo Min, Li Li.
Efficient Two-Party SM2 Signing Protocol for Mobile Internet
[J]. Journal of Computer Research and Development, 2020, 57(10): 2136-2146.
|
[3] |
Sun Qian, Xue Leiqi, Gao Ling, Wang Hai, Wang Yuxiang.
Selection of Network Defense Strategies Based on Stochastic Game and Tabu Search
[J]. Journal of Computer Research and Development, 2020, 57(4): 767-777.
|
[4] |
Liu Xuehua, Ding Liping, Liu Wenmao, Zheng Tao, Li Yanfeng, Wu Jingzheng.
A Cloud Forensics Method Based on SDS and Cloud Forensics Trend Analysis
[J]. Journal of Computer Research and Development, 2019, 56(10): 2262-2276.
|
[5] |
Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei.
Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events
[J]. Journal of Computer Research and Development, 2019, 56(6): 1275-1289.
|
[6] |
Yang Junnan, Zhang Hongqi, Zhang Chuanfu.
Network Defense Decision-Making Method Based on Stochastic Game and Improved WoLF-PHC
[J]. Journal of Computer Research and Development, 2019, 56(5): 942-954.
|
[7] |
Xi Liang, Wang Yong, Zhang Fengbin.
Anomaly Detection Algorithm Based on FCM with Adaptive Artificial Fish-Swarm
[J]. Journal of Computer Research and Development, 2019, 56(5): 1048-1059.
|
[8] |
Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin.
An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests
[J]. Journal of Computer Research and Development, 2019, 56(3): 566-575.
|
[9] |
Zhang Liancheng, Wang Yu, Kong Yazhou,Qiu Han.
Survey on Security Threats and Countermeasures of Network Flow Watermarking
[J]. Journal of Computer Research and Development, 2018, 55(8): 1785-1799.
|
[10] |
Xu Zhiwei, Zhang Yujun.
Efficient Detection of False Data Fusion in IoT
[J]. Journal of Computer Research and Development, 2018, 55(7): 1488-1497.
|
[11] |
Huang Rui, Zhang Hongqi, Chang Dexian.
A Backup and Recovery Mechanism for Security Service Chain Fault in Network Function Virtualization Environment
[J]. Journal of Computer Research and Development, 2018, 55(4): 768-781.
|
[12] |
Zhang Liancheng, Wei Qiang, Tang Xiucun, Fang Jiabao.
Path and Port Address Hopping Based SDN Proactive Defense Technology
[J]. Journal of Computer Research and Development, 2017, 54(12): 2761-2771.
|
[13] |
Hu Qing, Lü Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang.
Advanced Persistent Threats Detection Game with Expert System for Cloud
[J]. Journal of Computer Research and Development, 2017, 54(10): 2344-2355.
|
[14] |
Liu Yi, Lei Cheng, Zhang Hongqi, Yang Yingjie.
MapReduce-Based Network Property Verification Technique for OpenFlow Network
[J]. Journal of Computer Research and Development, 2016, 53(11): 2500-2511.
|
[15] |
Zhang Yuqing, Jia Yan, Lei Kenan, Lü Shaoqing, Yue Hongzhou.
Survey of HTML5 New Features Security
[J]. Journal of Computer Research and Development, 2016, 53(10): 2163-2172.
|