[1] |
Jingcheng XU, Xuebin CHEN, Yanling DONG, Jia YANG.
DDoS attack detection by random forest fused with feature selection
[J]. Journal of Computer Applications, 2023, 43(11): 3497-3503.
|
[2] |
XU Guangxian, WANG Dong.
Secure network coding scheme based on chaotic encryption against wiretapping
[J]. Journal of Computer Applications, 2019, 39(5): 1374-1377.
|
[3] |
XIN Yingying, LIU Xiaojuan, FANG Chunlin, LUO Huan.
Optimization of data retransmission algorithm in information centric networking
[J]. Journal of Computer Applications, 2019, 39(3): 829-833.
|
[4] |
KONG Yazhou, ZHANG Liancheng, WANG Zhenxing.
Address hopping proactive defense model in IPv6 based on sliding time window
[J]. Journal of Computer Applications, 2018, 38(7): 1936-1940.
|
[5] |
CUI Huali, SUN Qindong, ZHANG Xingjun, WU Weiguo.
Overview of network coding for video streaming
[J]. Journal of Computer Applications, 2018, 38(4): 1084-1088.
|
[6] |
XU Guangxian, ZHAO Yue, LAI Junning.
Deterministic layered construction algorithm based on network coding
[J]. Journal of Computer Applications, 2018, 38(3): 769-775.
|
[7] |
LUO Yujie, ZHANG Jian, TANG Zhangguo, LI Huanzhou.
Research summary of secure routing protocol for low-power and lossy networks
[J]. Journal of Computer Applications, 2018, 38(12): 3462-3470.
|
[8] |
GAO Fengyue, WANG Yan, LI Mu, YU Rui.
Joint channel non-coherent network coded modulation method
[J]. Journal of Computer Applications, 2018, 38(10): 2955-2959.
|
[9] |
ZHOU Kunxiao, ZHAO Hui, YUAN Huaqiang.
Multicast routing in cognitive radio networks: algorithms and protocols
[J]. Journal of Computer Applications, 2017, 37(2): 422-426.
|
[10] |
YAO Yukun, LI Xiaoyong, REN Zhi, LIU Jiangbing.
High efficiency medium access control protocol based on cooperative network coding
[J]. Journal of Computer Applications, 2017, 37(10): 2748-2753.
|
[11] |
WU Huiting, WANG Zhenxing, ZHANG Liancheng, KONG Yazhou.
IMTP: a privacy protection mechanism for MIPv6 identity and moving trajectory
[J]. Journal of Computer Applications, 2016, 36(8): 2236-2240.
|
[12] |
HUANG Chengbing, TANG Gang, WANG Bo.
Non-orthogonal network coding for complex field distributed detection based on super node MAC relay
[J]. Journal of Computer Applications, 2016, 36(12): 3256-3261.
|
[13] |
HE Keyan, ZHAO Hongyu.
Novel secure network coding scheme against global wiretapping
[J]. Journal of Computer Applications, 2016, 36(12): 3317-3321.
|
[14] |
GUO Qiang, QIN Yue.
Improved relay forwarding scheme based on network coding
[J]. Journal of Computer Applications, 2016, 36(1): 61-65.
|
[15] |
HAN Guoliang, SHENG Maojia, BAO Congxiao, LI Xing.
Stateless communication mechanism between an IPv4 network and the IPv6 Internet
[J]. Journal of Computer Applications, 2015, 35(8): 2113-2117.
|