[1] |
Li Xuebing, Chen Yang, Zhou Mengying, Wang Xin.
Internet Data Transfer Protocol QUIC: A Survey
[J]. Journal of Computer Research and Development, 2020, 57(9): 1864-1876.
|
[2] |
Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming.
DiffSec: A Differentiated Intelligent Network Security Service Model
[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966.
|
[3] |
Zhang Yuqing, Dong Ying, Liu Caiyun, Lei Kenan, Sun Hongyu.
Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security
[J]. Journal of Computer Research and Development, 2018, 55(6): 1117-1142.
|
[4] |
Qi Yanli, Zhou Yiqing, Liu Ling, Tian Lin, Shi Jinglin.
MEC Coordinated Future 5G Mobile Wireless Networks
[J]. Journal of Computer Research and Development, 2018, 55(3): 478-486.
|
[5] |
Zheng Zheng, Xu Mingwei, Li Qi, Zhang Yun.
Defending Against SDN Network Topology Poisoning Attacks
[J]. Journal of Computer Research and Development, 2018, 55(1): 207-215.
|
[6] |
Yang An, Sun Limin, Wang Xiaoshan, Shi Zhiqiang.
Intrusion Detection Techniques for Industrial Control Systems
[J]. Journal of Computer Research and Development, 2016, 53(9): 2039-2054.
|
[7] |
Fu Zhiyao, Gao Ling, Sun Qian, Li Yang, Gao Ni.
Evaluation of Vulnerability Severity Based on Rough Sets and Attributes Reduction
[J]. Journal of Computer Research and Development, 2016, 53(5): 1009-1017.
|
[8] |
Wang Yichuan, Ma Jianfeng, Lu Di,Zhang Liumei,Meng Xianjia.
Game Optimization for Internal DDoS Attack Detection in Cloud Computing
[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882.
|
[9] |
Wen Kun,Yang Jiahai,Cheng Fengjuan,Yin Hui, Wang Jianfeng.
MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network
[J]. Journal of Computer Research and Development, 2015, 52(4): 813-822.
|
[10] |
Xu Qingui, Huang Peican, Yang Taolan.
An Enhanced Biometrics-Key-Based Remote User Authentication Scheme with Smart Card
[J]. Journal of Computer Research and Development, 2015, 52(11): 2645-2655.
|
[11] |
Liu Yuling1,2,3, Feng Dengguo1,2, Lian Yifeng1,2,3, Chen Kai3, Wu Di1,2.
Network Situation Prediction Method Based on Spatial-Time Dimension Analysis
[J]. Journal of Computer Research and Development, 2014, 51(8): 1681-1694.
|
[12] |
Cui Shaolong1,2, Yao Xiangzhen3, Fang Jinyun1.
An Optimized Acquisition Algorithm in GPS Software Receiver
[J]. Journal of Computer Research and Development, 2014, 51(8): 1794-1801.
|
[13] |
Lin Hui1, Ma Jianfeng2, and Xu Li1.
A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism
[J]. 计算机研究与发展, 2014, 51(7): 1486-1496.
|
[14] |
Zhou Yanwei1,2, Yang Qiliang3, Yang Bo2, and Wu Zhenqiang1,2.
A Tor Anonymous Communication System with Security Enhancements
[J]. 计算机研究与发展, 2014, 51(7): 1538-1546.
|
[15] |
Bu Ning1, Liu Yuling2, Lian Yifeng2, and Huang Liang2.
UML-Based Modeling Method of Network Security Infrastructure
[J]. 计算机研究与发展, 2014, 51(7): 1578-1593.
|