Deep search:Searching for "Hong-chao Hu" in 'AUTHORGot 4 items.
index Title
1Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fe...  Clicked:7792  Download:2749  Cited:0  <Full Text>  <PPT> 2223
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
2A forwarding graph embedding algorithm exploiting regional topology information
Author(s):Hong-chao Hu, Fan Zhang, Yu-xing M...  Clicked:8731  Download:3131  Cited:0  <Full Text>  <PPT> 2192
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.11 P.1854-1866  DOI:10.1631/FITEE.1601404
3Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional net...
Author(s):Yang Chen, Hong-chao HU, Guo-zhen ...  Clicked:10012  Download:3334  Cited:0  <Full Text>  <PPT> 2534
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
4Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual mach...
Author(s):Chao Yang, Yun-fei Guo, Hong-chao ...  Clicked:6953  Download:2784  Cited:0  <Full Text>  <PPT> 2123
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE