[1] |
YU Lihui, HU Shaowen, HUANG Langxin, LUO Shuhuan.
A Source Code Security Vulnerability Detection Method Using ChatGPT
[J]. Computer and Modernization, 2024, 0(04): 88-91.
|
[2] |
ZHOU Cheng-cheng, ZENG Qing-jun, YANG Kang, HU Jia-ming, HAN Chun-wei.
EEG Recognition of Motor Imagination Based on Efficiency Channel Attention Module
[J]. Computer and Modernization, 2023, 0(12): 19-23.
|
[3] |
BAO Chun-hui, ZHUANG Yi, GUO Li-ye.
Vulnerability Assessment Model of SDN Mobile Network for Service Transmission
[J]. Computer and Modernization, 2022, 0(11): 43-51.
|
[4] |
ZHANG Ling-yun, HAN Ying, ZHANG Kai, LU Hai-peng, DING Yu-jie.
Short-term Traffic Flow Prediction Model Based on Deep Learning
[J]. Computer and Modernization, 2022, 0(07): 54-60.
|
[5] |
WANG Jin , CHEN Xiao-xuan , XU Jia-li , WANG De-juan , YUAN Huan-huan .
A Quickly Mapping Method of Low Altitude UAV Images Based on SSEQ Algorithm
[J]. Computer and Modernization, 2021, 0(03): 122-126.
|
[6] |
WANG Gui-zhu, LU Ling-yun, LI Xiang.
Energy-Efficient Resource Allocation for Hybrid Spectrum Sharing Cognitive Radio Networks
[J]. Computer and Modernization, 2020, 0(10): 103-109.
|
[7] |
LI Hai-hao, WU Ya-feng, WANG Xiao-qiang.
Application of Timed Petri Net in Penetration Testing
[J]. Computer and Modernization, 2020, 0(10): 110-115.
|
[8] |
ZHANG Zhi-wei, GAN Gang.
Service Vulnerability Mining of Android System Based on Genetic Algorithm
[J]. Computer and Modernization, 2020, 0(08): 114-121.
|
[9] |
WANG Hong-kai1, YU Xiao-wen2, ZHANG Xu-dong1.
A Method of Security Risk Analysis for Network Based on Attack Detection and Vulnerability
[J]. Computer and Modernization, 2017, 0(1): 96-100.
|
[10] |
DA Xiao-wen, WANG Xiao-cheng, CHEN Zhi-hao.
Web Application Vulnerabilities Mining Method Based on Improved Fuzzing
[J]. Computer and Modernization, 2016, 0(8): 100-104.
|
[11] |
LEI Qiong.
Sequential-multi Digital Signature Application in Electronic Contract Signing
[J]. Computer and Modernization, 2016, 0(2): 72-74,81.
|
[12] |
DENG Xi-hui, ZHAO Li.
Speeding K-NN Classification Method Based on Data Block Mixed Measurement
[J]. Computer and Modernization, 2016, 0(12): 47-50.
|
[13] |
ZHENG Sheng-jun1, GUO Long-hua2, LI Jian-hua2, WANG Hong-kai3, LIU Yun4.
Multi-dimensional Monitoring System for Website Security Based on Cloud Platform
[J]. Computer and Modernization, 2016, 0(1): 39-45.
|
[14] |
LIU Hai-yan, HUANG Rui, HUANG Xuan.
Vulnerability Database Maintenance System Based on Topic Web Crawler
[J]. Computer and Modernization, 2014, 0(8): 67-70+80.
|
[15] |
WU Xiu-jun.
Hybrid Storage Strategy with MongoDB and MySQL for E-government
[J]. Computer and Modernization, 2014, 0(8): 62-66.
|