[1] |
ZHU Wenfeng, WANG Qin, GUO Zheng, LIU Junrong.
Research on Attacks Method for Block Ciphers
[J]. Computer Engineering, 2020, 46(1): 102-107,113.
|
[2] |
HOU Fangjie,WANG Lei,WANG Song,SHENG Jie.
Position-based automated protocol reverse analysis method on network flows
[J]. Computer Engineering, 2019, 45(5): 84-87.
|
[3] |
WEI Fang,ZOU Zhige.
RFID Tag Group Ownership Transfer Protocol Satisfying Backward Security
[J]. Computer Engineering, 2019, 45(4): 136-141.
|
[4] |
WANG Hui,WANG Yincheng,LU Shikai.
Attack Path Optimization Algorithm Based on Time Gain Compensation Rate
[J]. Computer Engineering, 2018, 44(8): 184-191,198.
|
[5] |
WANG Hui,LU Shikai,WANG Yincheng.
Intrusion Prediction Algorithm Based on Correlation Attack Graph
[J]. Computer Engineering, 2018, 44(7): 131-138.
|
[6] |
WANG Yan,LIU Jiayong,LIU Liang,JIA Peng,LIU Luping.
Research on Vulnerability Utilization Tool Development Framework
[J]. Computer Engineering, 2018, 44(3): 127-131.
|
[7] |
ZUO Xiaojun,DONG Limian,QU Wu.
Fast-Flux Botnet Detection Method Based on Domain Name System Traffic
[J]. Computer Engineering, 2017, 43(9): 185-193.
|
[8] |
LU Siyan,LAN Shaohua.
A Construction Method of Covert Channel Based on File Storage Distribution
[J]. Computer Engineering, 2017, 43(9): 199-204.
|
[9] |
LAN Geng,LIU Daowei.
Group RFID Tag Ownership Transfer Protocol Based on Word Synthesis Operation
[J]. Computer Engineering, 2017, 43(8): 151-155.
|
[10] |
SHEN Yuan,GAO Ling,GAO Ni,WANG Fan.
Hierarchical Attribute Reduction Model for Intrusion Detection Based on Cultural Algorithm
[J]. Computer Engineering, 2017, 43(7): 175-181.
|
[11] |
PENG Yanbin,TIAN Ye,PENG Xinguang.
An End-to-End Lightweight Authentication Protocol for Medical Wireless Body Area Network
[J]. Computer Engineering, 2017, 43(6): 73-77.
|
[12] |
MAO Qianren,WANG Chaobin,BAO Xiao’an,LI Yanmei.
Research on Guidance Mechanism of Internet Public Opinion Based on Cellular Automaton Model
[J]. Computer Engineering, 2017, 43(6): 105-110,117.
|
[13] |
HU Jipeng,TAN Li,YANG Minghua,ZHANG Yaming.
A User Behavior Measurement Method Based on Trusted Cryptography Module
[J]. Computer Engineering, 2017, 43(5): 121-128.
|
[14] |
LIU Xinliang,DU Ruiying,CHEN Jing,WANG Chiheng,YAO Shixiong,CHEN Jiong.
Security Threat and Defense Method for SSL/TLS Protocol Session Key
[J]. Computer Engineering, 2017, 43(3): 147-153.
|
[15] |
LIU Weiming,GAO Xiaodong,MAO Yimin,ZHOU Zhaofei.
Research and Application of Uncertain Genetic Neural Network in Landslide Hazard Prediction
[J]. Computer Engineering, 2017, 43(2): 308-316.
|