Advanced Search



11 results found in all.
index Title
1Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Author(s):Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI  Clicked:14112  Download:5408  Cited:8  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.2 P.119-129  DOI:10.1631/jzus.C0910488
2Moving target defense: state of the art and characteristics
Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG  Clicked:9674  Download:7128  Cited:1  <Full Text>  <PPT> 2690
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.11 P.1122-1153  DOI:10.1631/FITEE.1601321
3Enterprise-level business component identification in business architecture integration
Author(s):Jiong Fu, Xue-shan Luo, Ai-min Luo, Jun-xian Liu  Clicked:8999  Download:4171  Cited:0  <Full Text>  <PPT> 2443
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.9 P.1320-1335  DOI:10.1631/FITEE.1601836
4Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing  Clicked:9420  Download:4043  Cited:0  <Full Text>  <PPT> 2696
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
5Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties
Author(s):Yang Chen, Hong-chao HU, Guo-zhen Cheng  Clicked:10996  Download:4525  Cited:0  <Full Text>  <PPT> 2817
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
6Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li  Clicked:7926  Download:4130  Cited:0  <Full Text>  <PPT> 2477
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
7Transcriptional memory and response to adverse temperatures in plants
Author(s):Wei XIE, Qianqian TANG, Fei YAN, Zeng TAO  Clicked:5650  Download:4992  Cited:0  <Full Text>  <PPT> 2171
Journal of Zhejiang University Science B  2021 Vol.22 No.10 P.791-804  DOI:10.1631/jzus.B2100287
8OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense
Author(s):Dandan WU, Jie CHEN, Ruiyun XIE, Ke CHEN  Clicked:3210  Download:2388  Cited:0  <Full Text>  <PPT> 769
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1209-1225  DOI:10.1631/FITEE.2300662
9A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng SHI, Yang ZHAI, Yahong HAN, Qinghua HU  Clicked:3177  Download:4702  Cited:0  <Full Text>  <PPT> 824
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.510-533  DOI:10.1631/FITEE.2300867
10Low-rank matrix recovery with total generalized variation for defending adversarial examples
Author(s):Wen LI, Hengyou WANG, Lianzhi HUO, Qiang HE, Linlin CHEN, Zhiquan HE, Wing W. Y. Ng  Clicked:4113  Download:3384  Cited:0  <Full Text>  <PPT> 442
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.432-445  DOI:10.1631/FITEE.2300017
11Active cybersecurity: vision, model, and key technologies
Author(s):Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG  Clicked:2477  Download:4225  Cited:0  <Full Text>  <PPT> 649
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1243-1278  DOI:10.1631/FITEE.2500053
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE