[1] |
MO Yan, TANG Rong-chuan, JU Hao, SUN Shao-fei, WANG An.
Commercial Cryptographic Upgrade for Industrial Internet Platform
[J]. Computer and Modernization, 2023, 0(06): 118-126.
|
[2] |
WU Yang1, WU Guo-wen1, ZHANG Hong1, SHEN Shi-gen2, CAO Qi-ying.
Rumor Source Detection Based on Extended Epidemic Model
[J]. Computer and Modernization, 2022, 0(01): 113-119.
|
[3] |
LU Sai, ZHUANG Yi.
Information System Risk Assessment Model Based on Self-Adaptive Expert Weight
[J]. Computer and Modernization, 2021, 0(08): 85-93.
|
[4] |
GE Bin, CHEN Gang, FANG Rui, LIAO Zhong-zhi.
A Novel Hyper Chaotic Image Encryption Algorithm Using Four Directional Diffusion Based on Matrix
[J]. Computer and Modernization, 2021, 0(06): 113-119.
|
[5] |
CUI Wen-di, DUAN Peng-fei, ZHU Hong-qiang, LIU Na.
Security Risk Assessmenton of Attack Graph and HMM Industrial Control Network
[J]. Computer and Modernization, 2020, 0(07): 32-37.
|
[6] |
CHEN Hai-yang1, HUAN Xiao-min1, CHEN Xin-zhan2, LIU Xi-qing1.
Intelligent Dynamic Estimation of Traffic Light Time Based on TAN Classifier
[J]. Computer and Modernization, 2019, 0(11): 81-.
|
[7] |
ZHANG Su-ning, WANG Yue-juan, WU Shui-ming, JING Dong-sheng.
Network Intrusion Data Clustering Algorithm Based on Krylov Subspace
[J]. Computer and Modernization, 2019, 0(10): 121-.
|
[8] |
YE Qian1,WANG Yu-fei2,FU Yi3,TANG Yu-lan1.
GQM-based Risk Assessment Method for Industrial Control Systems
[J]. Computer and Modernization, 2019, 0(08): 92-.
|
[9] |
MI Qian-kun1, WU Bin2, DU Ning1,QIN Xi1.
Information System Security Risk Assessment Based on Incomplete Information Game Model
[J]. Computer and Modernization, 2019, 0(04): 118-.
|
[10] |
WANG Yin, GUO Hong-yu.
CART-based Risk Assessment of Community Correction Staff
[J]. Computer and Modernization, 2018, 0(08): 73-.
|
[11] |
LIANG Cong1,2, LIAO Xin 3, ZHENG Xin1, CHEN Lei-ting1,4.
A Healthy Big Data Classification Model Based on Improved Bayesian Network
[J]. Computer and Modernization, 2017, 0(12): 61-64.
|
[12] |
PING Ping, HUANG Li-lin, MAO Ying-chi, XU Guo-yan.
Image Encryption Algorithm Based on Life-like Cellular Automaton
[J]. Computer and Modernization, 2017, 0(10): 95-99.
|
[13] |
YU Hao1, JIA Xue1, WANG Qiang2.
Research on Safety Protection Strategy of Smart Substation Application Layer Data Encryption
[J]. Computer and Modernization, 2016, 0(2): 82-85.
|
[14] |
TANG Lian, WANG Xiao-long.
Pattern Matching-based Wireless Network Security Configuration Verification Tool
[J]. Computer and Modernization, 2015, 0(10): 98-102.
|
[15] |
SUN Lin-fang1, XU Hui2, LI Jin-hai3.
Classification Model of New Media Events Based on Bayesian Network
[J]. Computer and Modernization, 2014, 0(5): 65-69,73.
|