
| index | Title |
| 1 | A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY Author(s):JIANG Xiao-ning, YE Cheng-qing Clicked:6148 Download:3300 Cited:0 <Full Text> Journal of Zhejiang University Science 2000 Vol.1 No.3 P.317-321 DOI:10.1631/jzus.2000.0317 |
| 2 | A new data normalization method for unsupervised anomaly intrusion detection Author(s):Long-zheng Cai, Jian Chen, Yun Ke,... Clicked:10600 Download:4334 Cited:2 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.10 P.778-784 DOI:10.1631/jzus.C0910625 |
| 3 | A 10 Gbps in-line network security processor based on configurable hetero-multi-cores Author(s):Yun Niu, Li-ji Wu, Yang Liu, Xiang... Clicked:10693 Download:4646 Cited:2 <Full Text> <PPT> 2987 Journal of Zhejiang University Science C 2013 Vol.14 No.8 P.642-651 DOI:10.1631/jzus.C1200370 |
| 4 | Botnet detection techniques: review, future trends, and issues Author(s):Ahmad Karim, Rosli Bin Salleh, Muh... Clicked:23034 Download:27026 Cited:10 <Full Text> <PPT> 3718 Journal of Zhejiang University Science C 2014 Vol.15 No.11 P.943-983 DOI:10.1631/jzus.C1300242 |
| 5 | Anonymous-address-resolution model Author(s):Guang-jia Song, Zhen-zhou Ji Clicked:9181 Download:4963 Cited:0 <Full Text> <PPT> 2693 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.1044-1055 DOI:10.1631/FITEE.1500382 |
| 6 | A keyed-hashing based self-synchronization mechanism for port address hopping communication Author(s):Yue-bin Luo, Bao-sheng Wang, Xiao-... Clicked:10680 Download:4240 Cited:0 <Full Text> <PPT> 2839 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.5 P.719-728 DOI:10.1631/FITEE.1601548 |
| 7 | Game theoretic analysis for the mechanism of moving target defense Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-... Clicked:9446 Download:4077 Cited:0 <Full Text> <PPT> 2700 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.2017-2034 DOI:10.1631/FITEE.1601797 |
| 8 | A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Author(s):Ya Qin, Guo-wei Shen, Wen-bo Zhao,... Clicked:10295 Download:4052 Cited:0 <Full Text> <PPT> 2499 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.872-884 DOI:10.1631/FITEE.1800520 |
| 9 | EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things Author(s):Weiyong Yang, Wei Liu, Xingshen We... Clicked:9104 Download:9067 Cited:0 <Full Text> <PPT> 2222 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.3 P.374-399 DOI:10.1631/FITEE.1900636 |
| 10 | Automatic discovery of stateful variables in network protocol software based on replay analysis Author(s):Jianxin HUANG, Bo YU, Runhao LIU, ... Clicked:21362 Download:6466 Cited:0 <Full Text> <PPT> 1163 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.3 P.403-416 DOI:10.1631/FITEE.2200275 |