[1] |
XIAO Hang, LI Peng, MA Hui-ping, ZHU Feng, .
RFID System Security Analysis Model Based on Stochastic Petri Net
[J]. Computer and Modernization, 2023, 0(09): 105-114.
|
[2] |
DAI Rui-feng.
Model Construction of College Network Security System Based on SSL Virtual Technology
[J]. Computer and Modernization, 2020, 0(08): 122-126.
|
[3] |
ZHANG Yu1,2, GUO Chun1,2, SHEN Guo-wei1,2, PING Yuan3.
An IDS Alerts Preprocessing Method Based on Information Entropy
[J]. Computer and Modernization, 2020, 0(05): 111-.
|
[4] |
JIANG Wan-ming1,2, GUO Chun1,2, JIANG Chao-hui1,2.
A Low-rate DDoS Attack Detection Method Based on BiLSTM
[J]. Computer and Modernization, 2020, 0(05): 120-.
|
[5] |
CAO Yong-ming.
A Fuzzy Keyword Search Encryption Scheme Without Secure Channel
[J]. Computer and Modernization, 2020, 0(04): 42-.
|
[6] |
WANG Yao, LI Wei, WU Ke-he, CUI Wen-chao.
Application of Fusion Model of GBDT and LR in Encrypted Traffic Identification
[J]. Computer and Modernization, 2020, 0(03): 93-.
|
[7] |
QIN Lu-lu, ZHOU Li-jing, WANG Min.
A Conditional Proxy Re-encryption Supporting Multi-keyword Search
[J]. Computer and Modernization, 2020, 0(01): 100-.
|
[8] |
ZHOU Li-jing, WANG Min, QIN Lu-lu .
CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority
[J]. Computer and Modernization, 2019, 0(11): 60-.
|
[9] |
SONG Zi-hua1,2, GUO Chun1,2, JIANG Chao-hui1,2.
A Fast Trojan Detection Method Based on Network Traffic Analysis
[J]. Computer and Modernization, 2019, 0(06): 9-.
|
[10] |
WU Dong1,2, GUO Chun1,2, SHEN Guo-wei1,2.
An Alert Correlation Method Based on Multi-factors
[J]. Computer and Modernization, 2019, 0(06): 30-.
|
[11] |
ZENG Qi, HAN Xiao, CAO Yong-ming.
Integrated Public Key Encryption and Public Key Encryption with Keyword Search
[J]. Computer and Modernization, 2019, 0(04): 103-.
|
[12] |
MI Qian-kun1, WU Bin2, DU Ning1,QIN Xi1.
Information System Security Risk Assessment Based on Incomplete Information Game Model
[J]. Computer and Modernization, 2019, 0(04): 118-.
|
[13] |
LIAN Geng-xiong .
Trusted Mobile Application Market Based on Blockchain
[J]. Computer and Modernization, 2019, 0(03): 58-.
|
[14] |
SUN Yuan, LIAO Xiao-ping.
Abnormal Data Detection Method Based on Intelligent Bat Algorithm
[J]. Computer and Modernization, 2019, 0(03): 62-.
|
[15] |
HAN Xiao, ZENG Qi, CAO Yong-ming .
An Efficient Proxy Re-encryption Scheme with Keyword Search
[J]. Computer and Modernization, 2019, 0(03): 117-.
|