[1] |
DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao.
Zero-trust Dynamic Evaluation Method for IoT Terminals
[J]. Computer and Modernization, 2024, 0(11): 41-45.
|
[2] |
MA Huiping1, LI Peng1, 2, HU Sujun1.
Security Game Analysis Model of RFID System Based on Bayesian Attack Graph
[J]. Computer and Modernization, 2024, 0(07): 93-99.
|
[3] |
WANG Dongyue, LIU Hao.
Multi-agent Genetic Algorithm Based Cloud Platform Anti-fake Data Injection Attack Method
[J]. Computer and Modernization, 2024, 0(04): 21-26.
|
[4] |
YOU Jiajing1, 2, HE Yueshun1, HE Linlin1, ZHONG Hailong1, 2.
Encryption Traffic Classification Method Based on AHP-CNN
[J]. Computer and Modernization, 2024, 0(04): 83-87.
|
[5] |
XIAO Hang, LI Peng, MA Hui-ping, ZHU Feng, .
RFID System Security Analysis Model Based on Stochastic Petri Net
[J]. Computer and Modernization, 2023, 0(09): 105-114.
|
[6] |
DAI Rui-feng.
Model Construction of College Network Security System Based on SSL Virtual Technology
[J]. Computer and Modernization, 2020, 0(08): 122-126.
|
[7] |
ZHANG Yu1,2, GUO Chun1,2, SHEN Guo-wei1,2, PING Yuan3.
An IDS Alerts Preprocessing Method Based on Information Entropy
[J]. Computer and Modernization, 2020, 0(05): 111-.
|
[8] |
JIANG Wan-ming1,2, GUO Chun1,2, JIANG Chao-hui1,2.
A Low-rate DDoS Attack Detection Method Based on BiLSTM
[J]. Computer and Modernization, 2020, 0(05): 120-.
|
[9] |
CAO Yong-ming.
A Fuzzy Keyword Search Encryption Scheme Without Secure Channel
[J]. Computer and Modernization, 2020, 0(04): 42-.
|
[10] |
WANG Yao, LI Wei, WU Ke-he, CUI Wen-chao.
Application of Fusion Model of GBDT and LR in Encrypted Traffic Identification
[J]. Computer and Modernization, 2020, 0(03): 93-.
|
[11] |
QIN Lu-lu, ZHOU Li-jing, WANG Min.
A Conditional Proxy Re-encryption Supporting Multi-keyword Search
[J]. Computer and Modernization, 2020, 0(01): 100-.
|
[12] |
ZHOU Li-jing, WANG Min, QIN Lu-lu .
CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority
[J]. Computer and Modernization, 2019, 0(11): 60-.
|
[13] |
SONG Zi-hua1,2, GUO Chun1,2, JIANG Chao-hui1,2.
A Fast Trojan Detection Method Based on Network Traffic Analysis
[J]. Computer and Modernization, 2019, 0(06): 9-.
|
[14] |
WU Dong1,2, GUO Chun1,2, SHEN Guo-wei1,2.
An Alert Correlation Method Based on Multi-factors
[J]. Computer and Modernization, 2019, 0(06): 30-.
|
[15] |
ZENG Qi, HAN Xiao, CAO Yong-ming.
Integrated Public Key Encryption and Public Key Encryption with Keyword Search
[J]. Computer and Modernization, 2019, 0(04): 103-.
|