[1] |
Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN.
Review of marine ship communication cybersecurity
[J]. Journal of Computer Applications, 2024, 44(7): 2123-2136.
|
[2] |
Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI.
Survey of software security testing techniques in DevSecOps
[J]. Journal of Computer Applications, 2024, 44(11): 3470-3478.
|
[3] |
Bona XUAN, Jin LI, Yafei SONG, Zexuan MA.
Malicious code classification method based on improved MobileNetV2
[J]. Journal of Computer Applications, 2023, 43(7): 2217-2225.
|
[4] |
Qun WANG, Quan YUAN, Fujuan LI, Lingling XIA.
Review of zero trust network and its key technologies
[J]. Journal of Computer Applications, 2023, 43(4): 1142-1150.
|
[5] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[6] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[7] |
TANG Yanqiang, LI Chenghai, SONG Yafei.
Network security situation prediction based on improved particle swarm optimization and extreme learning machine
[J]. Journal of Computer Applications, 2021, 41(3): 768-773.
|
[8] |
HANG Mengxin, CHEN Wei, ZHANG Renjie.
Abnormal flow detection based on improved one-dimensional convolutional neural network
[J]. Journal of Computer Applications, 2021, 41(2): 433-440.
|
[9] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|
[10] |
CHI Yaping, MO Chongwei, YANG Yintan, CHEN Chunxia.
Design and implementation of intrusion detection model for software defined network architecture
[J]. Journal of Computer Applications, 2020, 40(1): 116-122.
|
[11] |
WANG Jiaxin, FENG Yi, YOU Rui.
Network security measurment based on dependency relationship graph and common vulnerability scoring system
[J]. Journal of Computer Applications, 2019, 39(6): 1719-1727.
|
[12] |
DU Junxiong, CHEN Wei, LI Xueyan.
Contextual authentication method based on device fingerprint of Internet of Things
[J]. Journal of Computer Applications, 2019, 39(2): 464-469.
|
[13] |
GUO Fangfang, CHAO Luomeng, ZHU Jianwen.
Multi-source data parallel preprocessing method based on similar connection
[J]. Journal of Computer Applications, 2019, 39(1): 57-60.
|
[14] |
ZHANG Youjie, ZHANG Qingping, WU wei, SHI Zhe.
Security analysis and evaluation of representational state transfer based on attack graph
[J]. Journal of Computer Applications, 2018, 38(6): 1653-1657.
|
[15] |
XIE Lixia, WANG Zhihua.
Network security situation assessment method based on cuckoo search optimized back propagation neural network
[J]. Journal of Computer Applications, 2017, 37(7): 1926-1930.
|