[1] |
DONG Gang, YU Wei, XUAN Guangzhe.
Analysis and Detection of Attack Characteristics inAdvanced Persistent Threats#br#
[J]. Journal of Jilin University Science Edition, 2019, 57(2): 339-344.
|
[2] |
WANG Daxing, TENG Jikai.
Authentication Scheme Based on Aggregate Signature in VSNs
[J]. Journal of Jilin University Science Edition, 2018, 56(3): 657-662.
|
[3] |
YAN Wei, ZHANG Jun.
Network Traffic Anomaly DetectionBased on Time Series Analysis
[J]. Journal of Jilin University Science Edition, 2017, 55(05): 1249-1254.
|
[4] |
YANG Jie, YIN Xiangdong, LIU Xiaobing.
Image Security Analysis Algorithm Based on Fusion of Chaotic System and Shift Register
[J]. Journal of Jilin University Science Edition, 2017, 55(03): 657-663.
|
[5] |
XUE Yadi, RUAN Wenhui.
Image Encryption Algorithm Based on Combined Chaotic System
[J]. Journal of Jilin University Science Edition, 2017, 55(02): 352-356.
|
[6] |
WANG Hui, WANG Zhe, LIU Shufen.
Path Behavior Analysis Method of Network AttackBased on Path Revenue Calculation
[J]. Journal of Jilin University Science Edition, 2017, 55(02): 311-321.
|
[7] |
HE Yukun, LI Qiang, JI Yuede, GUO Dong.
Analysis of Botnet Detection Technique Based on Traffic Graph
[J]. Journal of Jilin University Science Edition, 2013, 51(04): 681-688.
|
[8] |
TU Yi-Cheng, ZHANG Wen-Cai, HU Liang, TUN Fang-Meng, CHU Jian-Feng.
Improvement and Optimization of LEAP Scheme forKey Management in Wireless Sensor Networks
[J]. J4, 2013, 51(03): 483-486.
|
[9] |
JIANG Chao, WANG Hai-Yan, CHEN Lei, DAN Jing-Feng.
A Novel Security Algorithm Based on BiologicalImmune Principles in Wireless Sensor Networks
[J]. J4, 2012, 50(06): 1204-1208.
|
[10] |
SUN Cong, BANG Jun, JI Xin-Da, HU Liang.
Network Security Monitor System Based on Artificial Immune
[J]. J4, 2009, 47(05): 1035-1038.
|
[11] |
ZHENG Wanbo, LIU Shufen, LI Shuqiu, WU Yaorui, MA Qiang.
Data Security Transmission Based on IPv6/IPv4 Tunnel
[J]. J4, 2008, 46(06): 1155-1158.
|
[12] |
LI Ruixue,, FANG Zhiyi,, DAI Zhiming, YAN Youlai, XIAO Wei.
Research of IDS Evaluation Method Based on Bayesian Theory
[J]. J4, 2008, 46(05): 925-929.
|
[13] |
KU Yu, HU Liang, ZHANG Xiaohui.
An Autonomous Distributed Intrusion Detection SystemBased on Agent and Honeypot
[J]. J4, 2007, 45(03): 399-404.
|
[14] |
QU Ming, LIU Shufen, YU Zhao, GONG Guannan.
A Security Service Model of Network Management for Pervasive Computing
[J]. J4, 2006, 44(06): 181-184.
|
[15] |
YAO Zhi-lin, LIU Shu-fen, HAN Zheng-fu.
Improvement of Compatibility of IPsec with NAT
[J]. J4, 2005, 43(04): 450-454.
|