[1] |
MO Yan, TANG Rong-chuan, JU Hao, SUN Shao-fei, WANG An.
Commercial Cryptographic Upgrade for Industrial Internet Platform
[J]. Computer and Modernization, 2023, 0(06): 118-126.
|
[2] |
WU Yang1, WU Guo-wen1, ZHANG Hong1, SHEN Shi-gen2, CAO Qi-ying.
Rumor Source Detection Based on Extended Epidemic Model
[J]. Computer and Modernization, 2022, 0(01): 113-119.
|
[3] |
GE Bin, CHEN Gang, FANG Rui, LIAO Zhong-zhi.
A Novel Hyper Chaotic Image Encryption Algorithm Using Four Directional Diffusion Based on Matrix
[J]. Computer and Modernization, 2021, 0(06): 113-119.
|
[4] |
ZHANG Su-ning, WANG Yue-juan, WU Shui-ming, JING Dong-sheng.
Network Intrusion Data Clustering Algorithm Based on Krylov Subspace
[J]. Computer and Modernization, 2019, 0(10): 121-.
|
[5] |
YE Qian1,WANG Yu-fei2,FU Yi3,TANG Yu-lan1.
GQM-based Risk Assessment Method for Industrial Control Systems
[J]. Computer and Modernization, 2019, 0(08): 92-.
|
[6] |
ZHANG Ming-huan1, CHEN Ying1, SHEN Ying2, CHENG Ai-lan2, LIU Xiao-qing2.
Classification and Identification of Magnetic Resonance Images of #br# Duchenne Muscular Dystrophy with Convolutional Neural Network
[J]. Computer and Modernization, 2019, 0(02): 43-.
|
[7] |
HUANG Yujie, TANG Zuoqi.
Information Security Risk Assessment Based on Improved Bayesian Network Model
[J]. Computer and Modernization, 2018, 0(04): 95-.
|
[8] |
PING Ping, HUANG Li-lin, MAO Ying-chi, XU Guo-yan.
Image Encryption Algorithm Based on Life-like Cellular Automaton
[J]. Computer and Modernization, 2017, 0(10): 95-99.
|
[9] |
YU Hao1, JIA Xue1, WANG Qiang2.
Research on Safety Protection Strategy of Smart Substation Application Layer Data Encryption
[J]. Computer and Modernization, 2016, 0(2): 82-85.
|
[10] |
LI Wen-quan, LI Dan.
Key Construction Project Management System Based on Web
[J]. Computer and Modernization, 2014, 0(5): 141-144,149.
|
[11] |
YANG Yun-ping, WU Zhi-jun.
Application of Apache Shiro Security Framework in Technology Transfer Services System
[J]. Computer and Modernization, 2014, 0(3): 158-160.
|
[12] |
PU Lin.
Identity Authentication Service Based on Restful
[J]. Computer and Modernization, 2014, 0(3): 165-168.
|
[13] |
WANG Shan-jun, YANG Yu-wang.
Research and Implementation of Solid Rocket Boosters CAD System Software
[J]. Computer and Modernization, 2014, 0(11): 76-81.
|
[14] |
YIN Bo;CHEN Lu;CHEN Liang;WANG Yu-fei.
Application of Information Security Key Technologies for Smart Grid in Sino-Singapore Tianjin Eco-city
[J]. Computer and Modernization, 2013, 1(9): 186-189.
|
[15] |
TAN Ying.
Comparative Study of Information Hiding Method Based on Text Typesetting Format
[J]. Computer and Modernization, 2013, 1(6): 52-56.
|