| [1] | Jiepo FANG, Chongben TAO. 
														
															Hybrid internet of vehicles intrusion detection system for zero-day attacks
														[J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. | 
																																																																																
													| [2] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. 
														
															Coverage-guided fuzzing based on adaptive sensitive region mutation
														[J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. | 
																																																																																
													| [3] | . 
														
															Summary of network intrusion detection systems based on deep learning
														[J]. Journal of Computer Applications, 0, (): 0-0. | 
																																																																																
													| [4] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. 
														
															Multi-object cache side-channel attack detection model based on machine learning
														[J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. | 
																																																																																
													| [5] | . 
														
															Location privacy-preserving recommendation scheme based on federated graph neural network
														[J]. Journal of Computer Applications, 0, (): 0-0. | 
																																																																																
													| [6] | XiangJun LI, Junhong WANG, Shilu WANG, Jinxia CHEN, Jitao SUN, Jianhui WANG. 
														
															Malicious traffic detection method based on multi-model parallel fusion network
														[J]. Journal of Computer Applications, 2023, 43(S2): 122-129. | 
																																																																																
													| [7] | Jingcheng XU, Xuebin CHEN, Yanling DONG, Jia YANG. 
														
															DDoS attack detection by random forest fused with feature selection
														[J]. Journal of Computer Applications, 2023, 43(11): 3497-3503. | 
																																																																																
													| [8] | Shanshan HUO, Yanjun LI, Jian LIU, Yinshuang LI. 
														
															Design and implementation of cipher component security criteria testing tool
														[J]. Journal of Computer Applications, 2023, 43(10): 3156-3161. | 
																																																																																
													| [9] | Xiang GUO, Wengang JIANG, Yuhang WANG. 
														
															Encrypted traffic classification method based on improved Inception-ResNet
														[J]. Journal of Computer Applications, 2023, 43(8): 2471-2476. | 
																																																																																
													| [10] | Kui JIANG, Zhihang YU, Xiaolei CHEN, Yuhao LI. 
														
															Design and implementation of Webshell traffic detection system based on BERT-CNN
														[J]. Journal of Computer Applications, 2023, 43(S1): 126-132. | 
																																																																																
													| [11] | Chao ZHENG, Yueting WU, Ke XIAO. 
														
															Intrusion detection based on federated learning and deep residual network
														[J]. Journal of Computer Applications, 2023, 43(S1): 133-138. | 
																																																																																
													| [12] | Yiting SUN, Yue GUO, Changjin LI, Hongjun ZHANG, Kang LIU, Junjiao Liu, Limin SUN. 
														
															Intrusion detection method for control logic injection attack against programmable logic controller
														[J]. Journal of Computer Applications, 2023, 43(6): 1861-1869. | 
																																																																																
													| [13] | Haiyan HU, Qiaoyan KANG, Shuo ZHAO, Jianfeng WANG, Youbin FU. 
														
															Service function chain deployment optimization method based on node comprehensive importance ranking
														[J]. Journal of Computer Applications, 2023, 43(3): 860-868. | 
																																																																																
													| [14] | Jingyun CHENG, Buhong WANG, Peng LUO. 
														
															Static code defect detection method based on deep semantic fusion
														[J]. Journal of Computer Applications, 2022, 42(10): 3170-3176. | 
																																																																																
													| [15] | Wenting BI, Haitao LIN, Liqun ZHANG. 
														
															Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model
														[J]. Journal of Computer Applications, 2022, 42(9): 2780-2787. |