[1] |
Changhong YU, Ya LU, Haixin WANG, Ming GAO.
Traffic Classification Algorithm for IoT Device Based on Sliding Time Window
[J]. Computer Engineering, 2023, 49(7): 259-268.
|
[2] |
FU Jiahao, YANG Jiayi, LI Aiguo.
High-Utility Semantic Trajectory Pattern Mining for Security System
[J]. Computer Engineering, 2023, 49(6): 62-70.
|
[3] |
HUO Yuehua, ZHAO Faqi.
Encrypted Malicious Traffic Detection Based on Stacking and Multi-Feature Fusion
[J]. Computer Engineering, 2023, 49(5): 165-172,180.
|
[4] |
WANG Yicheng, GUO Rui, MENG Tong, LIU Yingfei.
Privacy Protection Scheme Based on Proxy Blind Signcryption in Smart Grid
[J]. Computer Engineering, 2023, 49(5): 150-164.
|
[5] |
LI Jingwen, ZHAO Kui.
Password Guessing Method Based on Improved PCFG Algorithm
[J]. Computer Engineering, 2023, 49(5): 38-47.
|
[6] |
SUN Yangwei, QI Yong.
Intrusion Detection Method for In-Vehicle CAN Based on Cluster Mixed Sampling and PSO-Stacking
[J]. Computer Engineering, 2023, 49(1): 138-145.
|
[7] |
GE Xin, ZOU Futai, GUO Wanda, TAN Yue, LI Linsen.
Review on Development of Social Botnets
[J]. Computer Engineering, 2022, 48(8): 12-24.
|
[8] |
ZHANG Liang, LIU Baixiang.
Survey on Integrated Technology of Blockchain and Secret Sharing
[J]. Computer Engineering, 2022, 48(8): 1-11.
|
[9] |
DING Xiaohui, CAO Suzhen, WANG Caifen.
Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security
[J]. Computer Engineering, 2022, 48(7): 141-150.
|
[10] |
ZHANG Chao, PENG Changgen, DING Hongfa, XU Dequan.
Searchable Encryption Scheme Based on China State Cryptography Standard SM9
[J]. Computer Engineering, 2022, 48(7): 159-167.
|
[11] |
XIE Na, TAN Wenan, CAO Yan, ZHAO Lu.
Modeling and Analysis of Security Information Flow in Mobile Edge Computing
[J]. Computer Engineering, 2022, 48(5): 35-42,52.
|
[12] |
CHEN Ruyu, DAI Huan, GAO Yujian, FU Baochuan, CHEN Jie.
Electronic Degree Certificate Data Protection and Sharing Method Based on Blockchain
[J]. Computer Engineering, 2022, 48(4): 50-60,80.
|
[13] |
CUI Jingyang, CHEN Zhenguo, TIAN Liqin, ZHANG Guanghua.
Overview of User and Entity Behavior Analytics Technology Based on Machine Learning
[J]. Computer Engineering, 2022, 48(2): 10-24.
|
[14] |
SUN Pengyu, ZHANG Hengwei, TAN Jinglei, LI Chenwei, MA Junqiang, WANG Jindong.
Network Security Defense Decision Method Based on Time Game
[J]. Computer Engineering, 2022, 48(11): 145-151.
|
[15] |
BAO Zhiting, KE Junming, YANG Zheng, LONG Hua, HUANG Dong.
Time-based One-Time Password Scheme for PLC
[J]. Computer Engineering, 2021, 47(8): 149-156.
|