[1] |
Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG.
Research and implementation of reputation-based inter-domain routing selection mechanism
[J]. Journal on Communications, 2023, 44(6): 47-56.
|
[2] |
Haiyan KANG, Molan LONG.
Research on network attack analysis method based on attack graph of absorbing Markov chain
[J]. Journal on Communications, 2023, 44(2): 122-135.
|
[3] |
Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU.
Network security situational awareness model based on threat intelligence
[J]. Journal on Communications, 2021, 42(6): 182-194.
|
[4] |
Tengfei ZHANG, Shunzheng YU.
Research prospects of user information detection from encrypted traffic of mobile devices
[J]. Journal on Communications, 2021, 42(2): 154-167.
|
[5] |
Xu CHENG, Yingying WANG, Nianjie ZHANG, Zhangjie FU, Beijing CHEN, Guoying ZHAO.
Multi-level loss object tracking adversarial attack method based on spatial perception
[J]. Journal on Communications, 2021, 42(11): 242-254.
|
[6] |
Tao HUANG, Jiang LIU, Shuo WANG, Chen ZHANG, Yunjie LIU.
Survey of the future network technology and trend
[J]. Journal on Communications, 2021, 42(1): 130-150.
|
[7] |
Zhiyong LUO,Xu YANG,Jiahui LIU,Rui XU.
Network intrusion intention analysis model based on Bayesian attack graph
[J]. Journal on Communications, 2020, 41(9): 160-169.
|
[8] |
Hanxun ZHOU,Chen CHEN,Runze FENG,Junkun XIONG,Hong PAN,Wei GUO.
Mobile malware traffic detection approach based on value-derivative GRU
[J]. Journal on Communications, 2020, 41(1): 102-113.
|
[9] |
JIANG Lyu,ZHANG Hengwei,WANG Jindong.
Optimal strategy selection method for moving target defense based on signaling game
[J]. Journal on Communications, 2019, 40(6): 128-137.
|
[10] |
Zhiyong LUO, Xu YANG, Guanglu SUN, Zhiqiang XIE, Jiahui LIU.
Finite automaton intrusion tolerance system model based on Markov
[J]. Journal on Communications, 2019, 40(10): 79-89.
|
[11] |
Yu XIONG, Jinyou HE, Baohua WANG, Bin ZHOU.
Energy-saving algorithm considering idle light-path prediction in SDM-EON
[J]. Journal on Communications, 2019, 40(10): 137-148.
|
[12] |
Cunqian YU,Mingzhu TANG,Rongxi HE.
Energy-efficient dynamic wavelength and bandwidth allocation algorithm with delay constraint for time and wavelength division multiplexed passive optical networks
[J]. Journal on Communications, 2018, 39(9): 110-121.
|
[13] |
Shirui HUANG,Hengwei ZHANG,Jindong WANG,Ruiyu DOU.
Network security threat warning method based on qualitative differential game
[J]. Journal on Communications, 2018, 39(8): 29-36.
|
[14] |
Xiaodong ZANG,Jian GONG,Xiaoyan HU.
Detecting malicious domain names based on AGD
[J]. Journal on Communications, 2018, 39(7): 15-25.
|
[15] |
Junbin LIANG,Xiang ZHOU,Taoshen LI.
Energy saving proactive neighbor discovery algorithm in mobile low-duty-cycle wireless sensor network
[J]. Journal on Communications, 2018, 39(4): 45-55.
|