
| index | Title |
| 1 | An immunity-based technique to detect network intrusions Author(s):PAN Feng, DING Yun-fei, WANG Wei-n... Clicked:8125 Download:3949 Cited:119 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.5 P.371-377 DOI:10.1631/jzus.2005.A0371 |
| 2 | Cost management based security framework in mobile ad hoc networks Author(s):Yang Rui-jun, Xia Qi, Pan Qun-hua,... Clicked:7432 Download:3720 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.4 P.493-501 DOI:10.1631/jzus.2006.A0493 |
| 3 | Using bidirectional links to improve peer-to-peer lookup performance Author(s):JIANG Jun-jie, TANG Fei-long, PAN ... Clicked:7265 Download:3860 Cited:2 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.6 P.945-951 DOI:10.1631/jzus.2006.A0945 |