[1] |
Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG.
Research and implementation of reputation-based inter-domain routing selection mechanism
[J]. Journal on Communications, 2023, 44(6): 47-56.
|
[2] |
Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN.
Intelligent planning method for cyber defense strategies based on bounded rationality
[J]. Journal on Communications, 2023, 44(5): 52-63.
|
[3] |
Yuancheng LI, Yongtai QIN.
Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform
[J]. Journal on Communications, 2023, 44(5): 181-192.
|
[4] |
Zaijian WANG, Huimin GU.
Network slicing resource allocation strategy based on joint optimization
[J]. Journal on Communications, 2023, 44(5): 234-245.
|
[5] |
Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG.
Survey on rail transit mobile edge computing network security
[J]. Journal on Communications, 2023, 44(4): 201-215.
|
[6] |
Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG.
Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
[J]. Journal on Communications, 2023, 44(4): 216-225.
|
[7] |
Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG.
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
[J]. Journal on Communications, 2023, 44(3): 117-127.
|
[8] |
Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG.
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
[J]. Journal on Communications, 2023, 44(2): 70-81.
|
[9] |
Haiyan KANG, Molan LONG.
Research on network attack analysis method based on attack graph of absorbing Markov chain
[J]. Journal on Communications, 2023, 44(2): 122-135.
|
[10] |
Caixia LIU, Xinsheng JI, Jiangxing WU.
Endogenous security common problems and solutions of the mobile communication networks
[J]. Journal on Communications, 2022, 43(9): 70-79.
|
[11] |
Runhua SHI, Hui YU, Weiyang KE, Xiaotong XU.
Quantum anonymous one-vote veto protocol based on BB84 states
[J]. Journal on Communications, 2022, 43(8): 109-120.
|
[12] |
Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, Guojiang XIA.
Survey of capacity limits and implementation techniques in wireless covert communication
[J]. Journal on Communications, 2022, 43(8): 203-218.
|
[13] |
Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU.
Fusion of Focal Loss’s cyber threat intelligence entity extraction
[J]. Journal on Communications, 2022, 43(7): 85-92.
|
[14] |
Hongbin LUO, Shan ZHANG, Zhiyuan WANG.
Architecture and mechanisms for secure and efficient internetworking of heterogeneous network
[J]. Journal on Communications, 2022, 43(4): 36-49.
|
[15] |
Huanhuan LIAN, Huiying HOU, Yunlei ZHAO.
Post-quantum verifier-based three-party password authenticated key exchange protocol
[J]. Journal on Communications, 2022, 43(4): 95-106.
|