Advanced Search



10 results found in all.
index Title
1Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Author(s):Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI  Clicked:12668  Download:4723  Cited:8  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.2 P.119-129  DOI:10.1631/jzus.C0910488
2Moving target defense: state of the art and characteristics
Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG  Clicked:7468  Download:4610  Cited:1  <Full Text>  <PPT> 2090
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.11 P.1122-1153  DOI:10.1631/FITEE.1601321
3Enterprise-level business component identification in business architecture integration
Author(s):Jiong Fu, Xue-shan Luo, Ai-min Luo, Jun-xian Liu  Clicked:7281  Download:2604  Cited:0  <Full Text>  <PPT> 1884
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.9 P.1320-1335  DOI:10.1631/FITEE.1601836
4Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing  Clicked:7686  Download:2556  Cited:0  <Full Text>  <PPT> 2062
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
5Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties
Author(s):Yang Chen, Hong-chao HU, Guo-zhen Cheng  Clicked:8647  Download:2952  Cited:0  <Full Text>  <PPT> 2039
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
6Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li  Clicked:6471  Download:2486  Cited:0  <Full Text>  <PPT> 1909
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
7Transcriptional memory and response to adverse temperatures in plants
Author(s):Wei XIE, Qianqian TANG, Fei YAN, Zeng TAO  Clicked:4184  Download:3221  Cited:0  <Full Text>  <PPT> 1607
Journal of Zhejiang University Science B  2021 Vol.22 No.10 P.791-804  DOI:10.1631/jzus.B2100287
8OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense
Author(s):Dandan WU, Jie CHEN, Ruiyun XIE, Ke CHEN  Clicked:1564  Download:847  Cited:0  <Full Text>  <PPT> 202
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1209-1225  DOI:10.1631/FITEE.2300662
9A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng SHI, Yang ZHAI, Yahong HAN, Qinghua HU  Clicked:1229  Download:852  Cited:0  <Full Text>  <PPT> 38
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.510-533  DOI:10.1631/FITEE.2300867
10Low-rank matrix recovery with total generalized variation for defending adversarial examples
Author(s):Wen LI, Hengyou WANG, Lianzhi HUO, Qiang HE, Linlin CHEN, Zhiquan HE, Wing W. Y. Ng  Clicked:2515  Download:1395  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.432-445  DOI:10.1631/FITEE.2300017
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE