[1] |
Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG.
Research and implementation of reputation-based inter-domain routing selection mechanism
[J]. Journal on Communications, 2023, 44(6): 47-56.
|
[2] |
Haiyan KANG, Molan LONG.
Research on network attack analysis method based on attack graph of absorbing Markov chain
[J]. Journal on Communications, 2023, 44(2): 122-135.
|
[3] |
Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG.
HDFS-oriented cryptographic key resource control mechanism
[J]. Journal on Communications, 2022, 43(9): 27-41.
|
[4] |
Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU.
Network security situational awareness model based on threat intelligence
[J]. Journal on Communications, 2021, 42(6): 182-194.
|
[5] |
Yimin MAO, Qianhu DENG, Zhigang CHEN.
Parallel association rules incremental mining algorithm based on information entropy and genetic algorithm
[J]. Journal on Communications, 2021, 42(5): 122-136.
|
[6] |
Bolin MA, Zheng ZHANG, Hao LIU, Jiangxing WU.
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
[J]. Journal on Communications, 2021, 42(4): 127-138.
|
[7] |
Tengfei ZHANG, Shunzheng YU.
Research prospects of user information detection from encrypted traffic of mobile devices
[J]. Journal on Communications, 2021, 42(2): 154-167.
|
[8] |
Xu CHENG, Yingying WANG, Nianjie ZHANG, Zhangjie FU, Beijing CHEN, Guoying ZHAO.
Multi-level loss object tracking adversarial attack method based on spatial perception
[J]. Journal on Communications, 2021, 42(11): 242-254.
|
[9] |
Tao HUANG, Jiang LIU, Shuo WANG, Chen ZHANG, Yunjie LIU.
Survey of the future network technology and trend
[J]. Journal on Communications, 2021, 42(1): 130-150.
|
[10] |
Zhiyong LUO,Xu YANG,Jiahui LIU,Rui XU.
Network intrusion intention analysis model based on Bayesian attack graph
[J]. Journal on Communications, 2020, 41(9): 160-169.
|
[11] |
Liang YUAN, Xiao YU, Enjie DING, Xiaohu ZHAO, Shimin FENG, Da ZHANG, Tongyu LIU, Weidong WANG, Yanqiu HUANG.
Research on key technologies of human-machine-environment states perception in mine Internet of things
[J]. Journal on Communications, 2020, 41(2): 1-12.
|
[12] |
Hanxun ZHOU,Chen CHEN,Runze FENG,Junkun XIONG,Hong PAN,Wei GUO.
Mobile malware traffic detection approach based on value-derivative GRU
[J]. Journal on Communications, 2020, 41(1): 102-113.
|
[13] |
.
Dual-architecture Internet supporting intelligent governance of cyber content
[J]. Journal on Communications, 2019, 40(9): 1-14.
|
[14] |
JIANG Lyu,ZHANG Hengwei,WANG Jindong.
Optimal strategy selection method for moving target defense based on signaling game
[J]. Journal on Communications, 2019, 40(6): 128-137.
|
[15] |
Wei JIN,Mingjie YU,Fenghua LI,Zhengkun YANG,Kui GENG.
High-performance and high-concurrency encryption scheme for Hadoop platform
[J]. Journal on Communications, 2019, 40(12): 29-40.
|