[1] |
MO Yan, TANG Rong-chuan, JU Hao, SUN Shao-fei, WANG An.
Commercial Cryptographic Upgrade for Industrial Internet Platform
[J]. Computer and Modernization, 2023, 0(06): 118-126.
|
[2] |
WU Yang1, WU Guo-wen1, ZHANG Hong1, SHEN Shi-gen2, CAO Qi-ying.
Rumor Source Detection Based on Extended Epidemic Model
[J]. Computer and Modernization, 2022, 0(01): 113-119.
|
[3] |
GE Bin, CHEN Gang, FANG Rui, LIAO Zhong-zhi.
A Novel Hyper Chaotic Image Encryption Algorithm Using Four Directional Diffusion Based on Matrix
[J]. Computer and Modernization, 2021, 0(06): 113-119.
|
[4] |
DAI Rui-feng.
Model Construction of College Network Security System Based on SSL Virtual Technology
[J]. Computer and Modernization, 2020, 0(08): 122-126.
|
[5] |
ZHANG Su-ning, WANG Yue-juan, WU Shui-ming, JING Dong-sheng.
Network Intrusion Data Clustering Algorithm Based on Krylov Subspace
[J]. Computer and Modernization, 2019, 0(10): 121-.
|
[6] |
YE Qian1,WANG Yu-fei2,FU Yi3,TANG Yu-lan1.
GQM-based Risk Assessment Method for Industrial Control Systems
[J]. Computer and Modernization, 2019, 0(08): 92-.
|
[7] |
WEI Shan-shan, HAN Qing-min, GUO Xiao-wang, ZHANG Wan, GONG Chun-yan.
Research on Application of PKI Based on Nation Secret Algorithm in ICS
[J]. Computer and Modernization, 2018, 0(11): 1-.
|
[8] |
JU Shu-cun1,2, CHENG Wen-jie1,2, XU Jian-peng1,2, ZHOU Lu-yang1,2,.
Data Acquisition System for Agricultural Meteorological IOT
[J]. Computer and Modernization, 2018, 0(09): 105-.
|
[9] |
HUANG Shu-juan1, ZHU Yi-an2, GAO Wu-qi1, LUO Jun-min1.
Dual Triggered Security Access Mechanism for Embedded System Kernel
[J]. Computer and Modernization, 2018, 0(05): 79-.
|
[10] |
HUANG Yujie, TANG Zuoqi.
Information Security Risk Assessment Based on Improved Bayesian Network Model
[J]. Computer and Modernization, 2018, 0(04): 95-.
|
[11] |
YE Hui-cheng, LIU Guang-jie.
Design and Implementation of New Secure Socket Layer Protocol Based on Identity Encryption
[J]. Computer and Modernization, 2017, 0(9): 50-55.
|
[12] |
ZHAO Kai, TIAN Hongxian.
Research and Implementation of Remote Control System Based on Mesh Network
[J]. Computer and Modernization, 2017, 0(3): 1-.
|
[13] |
PING Ping, HUANG Li-lin, MAO Ying-chi, XU Guo-yan.
Image Encryption Algorithm Based on Life-like Cellular Automaton
[J]. Computer and Modernization, 2017, 0(10): 95-99.
|
[14] |
SHI Cheng-wei1, CAO Gui-ning1, CHEN Xiang-xian1, ZHOU Jie2.
Universal Remote Online Status Monitoring Terminal
[J]. Computer and Modernization, 2016, 0(3): 85-90.
|
[15] |
YU Hao1, JIA Xue1, WANG Qiang2.
Research on Safety Protection Strategy of Smart Substation Application Layer Data Encryption
[J]. Computer and Modernization, 2016, 0(2): 82-85.
|