Deep search:Searching for "Network security" in 'KEYWORDGot 10 items.
index Title
1A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
Author(s):JIANG Xiao-ning, YE Cheng-qing  Clicked:4759  Download:2625  Cited:0  <Full Text>
Journal of Zhejiang University Science  2000 Vol.1 No.3 P.317-321  DOI:10.1631/jzus.2000.0317
2A new data normalization method for unsupervised anomaly intrusion detection
Author(s):Long-zheng Cai, Jian Chen, Yun Ke,...  Clicked:8639  Download:3329  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.778-784  DOI:10.1631/jzus.C0910625
3A 10 Gbps in-line network security processor based on configurable hetero-multi-cores
Author(s):Yun Niu, Li-ji Wu, Yang Liu, Xiang...  Clicked:8217  Download:3662  Cited:2  <Full Text>  <PPT> 2489
Journal of Zhejiang University Science C  2013 Vol.14 No.8 P.642-651  DOI:10.1631/jzus.C1200370
4Botnet detection techniques: review, future trends, and issues
Author(s):Ahmad Karim, Rosli Bin Salleh, Muh...  Clicked:19520  Download:20368  Cited:10  <Full Text>  <PPT> 2732
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.943-983  DOI:10.1631/jzus.C1300242
5Anonymous-address-resolution model
Author(s):Guang-jia Song, Zhen-zhou Ji  Clicked:6648  Download:2451  Cited:0  <Full Text>  <PPT> 1776
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1044-1055  DOI:10.1631/FITEE.1500382
6A keyed-hashing based self-synchronization mechanism for port address hopping communication
Author(s):Yue-bin Luo, Bao-sheng Wang, Xiao-...  Clicked:7422  Download:2553  Cited:0  <Full Text>  <PPT> 2039
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.5 P.719-728  DOI:10.1631/FITEE.1601548
7Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-...  Clicked:6765  Download:2270  Cited:0  <Full Text>  <PPT> 1863
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
8A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
Author(s):Ya Qin, Guo-wei Shen, Wen-bo Zhao,...  Clicked:7202  Download:2318  Cited:0  <Full Text>  <PPT> 1749
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.872-884  DOI:10.1631/FITEE.1800520
9EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things
Author(s):Weiyong Yang, Wei Liu, Xingshen We...  Clicked:5953  Download:5759  Cited:0  <Full Text>  <PPT> 1549
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.3 P.374-399  DOI:10.1631/FITEE.1900636
10Automatic discovery of stateful variables in network protocol software based on replay analysis
Author(s):Jianxin HUANG, Bo YU, Runhao LIU, ...  Clicked:18606  Download:3156  Cited:0  <Full Text>  <PPT> 394
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.3 P.403-416  DOI:10.1631/FITEE.2200275
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE