[1] |
LU Sai, ZHUANG Yi.
Information System Risk Assessment Model Based on Self-Adaptive Expert Weight
[J]. Computer and Modernization, 2021, 0(08): 85-93.
|
[2] |
WANG Xiao-yu, SUN Ka.
Visualization of 3D Virtual Campus Based on osgEarth
[J]. Computer and Modernization, 2020, 0(11): 89-93.
|
[3] |
SUN Guang-cheng, LI Hong-zhe, LI Sai-fei, ZHANG Xiao-wei.
Internet of Things Access Control System Based on Blockchain
[J]. Computer and Modernization, 2020, 0(11): 100-108.
|
[4] |
DAI Yong-qiang, WANG Lian-guo.
Evaluation of Surface Soil Heavy Metal Pollution in City
[J]. Computer and Modernization, 2019, 0(08): 105-.
|
[5] |
DU Wen-hao, HU Wei-ping, ZHANG You-xian, YU Jian-tao.
Self-balancing Follow-up Robot Target Recognition and Loss Re-selection Strategy
[J]. Computer and Modernization, 2019, 0(05): 108-.
|
[6] |
YUAN Jie, ZHANG Min-lei.
Research on Fault Recovery Mechanism of Power Information System Based on SDN
[J]. Computer and Modernization, 2018, 0(11): 7-.
|
[7] |
XU Rui1,2, YOU Jia1,2, LIU Kun1,2, MA Feng1,2, DUAN Ke2, ZHONG Yan-tao3.
Identification System for Enterprise Users Based on
[J]. Computer and Modernization, 2018, 0(03): 102-.
|
[8] |
JIANG Hua, XU Guo-cun, YANG Jing.
Design and Implementation of Housing Levy and Compensation #br#
Information System on State-owned Land
[J]. Computer and Modernization, 2017, 0(5): 109-112.
|
[9] |
MA Jia-yan, WANG Ping, SHEN Hong-wei.
Design of Competitive Data Distribution System Based on Middleware
[J]. Computer and Modernization, 2017, 0(12): 94-97.
|
[10] |
GUO Long-hua1, XIA Zheng-min1, ZHENG Sheng-jun2, WANG Hong-kai3, MA Zhi-cheng4.
RBAC-based Security Access Scheme for Demand Response
[J]. Computer and Modernization, 2016, 0(3): 100-104+110.
|
[11] |
YU Yue-yang, MIAO Hong, GE Shi-lun, WANG Nian-xin.
Optimization of Enterprise Information System Menu Using Association
[J]. Computer and Modernization, 2016, 0(11): 99-103.
|
[12] |
QU Zhong, JIANG Shao-hua, ZHOU Biao.
Female Village Officers Information Support Network System
[J]. Computer and Modernization, 2016, 0(1): 12-15.
|
[13] |
REN Jia-jia, WANG Nian-xin, GE Shi-lun.
Statistical Properties and Dynamics Analyzing of #br#
Enterprise Information Systems Users’ Access Behavior
[J]. Computer and Modernization, 2015, 0(9): 6-12.
|
[14] |
REN Jia-jia, WANG Nian-xin, GE Shi-lun.
Analyzing Information Systems Users’ Access Behavior by Human Dynamics
[J]. Computer and Modernization, 2015, 0(10): 10-15.
|
[15] |
WANG Yuan1, YANG Yue-xiang2, DENG Wen-ping2.
A Ciphertext Access Control Scheme for Enterprise Synchronous Network Disk
[J]. Computer and Modernization, 2014, 0(3): 154-157,160.
|