[1] |
LIU Xing1, 2, GUO Liang1, 2, WANG Zhengqi1, 2, WEI Xiaogang1, 2, XU Xuefei1, 2, LIU Jing3.
Q-learning-based Algorithm for Orchestrating Security Service Function Chain
[J]. Computer and Modernization, 2024, 0(11): 34-40.
|
[2] |
DONG Yuwen.
Multi-scale Moving Object Detection Algorithm Based on Improved YOLOv7-tiny
[J]. Computer and Modernization, 2024, 0(11): 99-105.
|
[3] |
XU Xiaowei, CHENG Yu, QIAN Feng, ZHU Neng, DENG Mingxing.
Cryptographic Algorithm of IoV Communication Based on AES
[J]. Computer and Modernization, 2024, 0(09): 45-51.
|
[4] |
MA Yong, WANG Jun, ZHANG Zijian, ZHAO Yuyang, ZHANG Jing, ZHOU Ming.
Improved YOLOv8 Behavior Detection Algorithm for Intelligent Operation and#br#
Maintenance System
[J]. Computer and Modernization, 2024, 0(08): 43-48.
|
[5] |
MA Huiping1, LI Peng1, 2, HU Sujun1.
Security Game Analysis Model of RFID System Based on Bayesian Attack Graph
[J]. Computer and Modernization, 2024, 0(07): 93-99.
|
[6] |
YU Lihui, HU Shaowen, HUANG Langxin, LUO Shuhuan.
A Source Code Security Vulnerability Detection Method Using ChatGPT
[J]. Computer and Modernization, 2024, 0(04): 88-91.
|
[7] |
WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling.
Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology
[J]. Computer and Modernization, 2024, 0(01): 1-5.
|
[8] |
CAI Si-mu, WANG Li-bin.
A Universally-composable Secure Non-interactive Commitment Scheme
[J]. Computer and Modernization, 2024, 0(01): 6-12.
|
[9] |
HAN Kun, WANG Zheng, DUAN Jun-yong, YANG Hua-lin.
Overview of Data Processing Techniques for MIoT Based on Fog Computing
[J]. Computer and Modernization, 2024, 0(01): 13-20.
|
[10] |
LEI Yi-han, CAO Li-feng, HAN Meng-da, HAN Xue.
Security Handover Architecture and Method for Software Defined Space-ground#br#
Integration Network
[J]. Computer and Modernization, 2023, 0(08): 119-126.
|
[11] |
ZHA Kai-jin, WANG Zhi-bo, HE Yue-shun, XU Hong-zhen.
Survey on Blockchain Security Protection
[J]. Computer and Modernization, 2023, 0(06): 110-117.
|
[12] |
MO Yan, TANG Rong-chuan, JU Hao, SUN Shao-fei, WANG An.
Commercial Cryptographic Upgrade for Industrial Internet Platform
[J]. Computer and Modernization, 2023, 0(06): 118-126.
|
[13] |
YANG Jun, WANG Jin-lin, NI Hong, SHENG Yi-qiang, .
Dynamic Transfer Method Based on Sensitivity in Industrial Control Network Anomaly Detection
[J]. Computer and Modernization, 2023, 0(05): 46-51.
|
[14] |
MAO Ming-yang, XU Sheng-chao.
A New Active Defense Model for Complex Network Security
[J]. Computer and Modernization, 2023, 0(04): 118-122.
|
[15] |
PAN Yu-qing, ZHANG Su-ning, FENG Ren-jun, JING Dong-sheng.
Intrusion Detection Method Based on Particle Swarm Optimization Combined with LightGBM
[J]. Computer and Modernization, 2023, 0(04): 123-126.
|