| index | Title |
| 46 | A 10 Gbps in-line network security processor based on configurable hetero-multi-cores Author(s):Yun Niu, Li-ji Wu, Yang Liu, Xiang-min Zhang, Hong-yi Chen Clicked:10747 Download:4669 Cited:2 <Full Text> <PPT> 3009 Journal of Zhejiang University Science C 2013 Vol.14 No.8 P.642-651 DOI:10.1631/jzus.C1200370 |
| 47 | Analysis and design of a smart card based authentication protocol Author(s):Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou Clicked:10278 Download:4803 Cited:0 <Full Text> <PPT> 2609 Journal of Zhejiang University Science C 2013 Vol.14 No.12 P.909-917 DOI:10.1631/jzus.C1300158 |
| 48 | An in-situ slurry fracturing test for slurry shield tunneling Author(s):Xue-yan Liu, Da-jun Yuan Clicked:14053 Download:4919 Cited:3 <Full Text> <PPT> 2961 Journal of Zhejiang University Science A 2014 Vol.15 No.7 P.465-481 DOI:10.1631/jzus.A1400028 |
| 49 | Performance study of selective encryption in comparison to full encryption for still visual images Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan Clicked:11675 Download:5367 Cited:6 <Full Text> <PPT> 2829 Journal of Zhejiang University Science C 2014 Vol.15 No.6 P.435-444 DOI:10.1631/jzus.C1300262 |
| 50 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12685 Download:9565 Cited:7 <Full Text> <PPT> 3128 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 51 | Botnet detection techniques: review, future trends, and issues Author(s):Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar Clicked:23114 Download:27279 Cited:10 <Full Text> <PPT> 3748 Journal of Zhejiang University Science C 2014 Vol.15 No.11 P.943-983 DOI:10.1631/jzus.C1300242 |
| 52 | Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks Author(s):Qing-long Dai, Guo-chu Shou, Yi-hong Hu, Zhi-gang Guo Clicked:9580 Download:4577 Cited:3 <Full Text> <PPT> 2943 Journal of Zhejiang University Science C 2014 Vol.15 No.11 P.1058-1070 DOI:10.1631/jzus.C1400044 |
| 53 | ImgFS: a transparent cryptography for stored images using a filesystem in userspace Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan Clicked:9199 Download:5064 Cited:0 <Full Text> <PPT> 3139 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.1 P.28-42 DOI:10.1631/FITEE.1400133 |
| 54 | Moving target defense: state of the art and characteristics Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG Clicked:9723 Download:7235 Cited:1 <Full Text> <PPT> 2748 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.11 P.1122-1153 DOI:10.1631/FITEE.1601321 |
| 55 | A lightweight authentication scheme with user untraceability Author(s):Kuo-Hui Yeh Clicked:10814 Download:4818 Cited:2 <Full Text> <PPT> 2966 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.4 P.259-271 DOI:10.1631/FITEE.1400232 |
| 56 | A hybrid short-term load forecasting method based on improved ensemble empirical mode decomposition and back propagation neural network Author(s):Yun-luo Yu, Wei Li, De-ren Sheng, Jian-hong Chen Clicked:7914 Download:4940 Cited:1 <Full Text> <PPT> 3218 Journal of Zhejiang University Science A 2016 Vol.17 No.2 P.101-114 DOI:10.1631/jzus.A1500156 |
| 57 | Discovering optimal features using static analysis and a genetic search based method for Android malware detection Author(s):Ahmad Firdaus, Nor Badrul Anuar, Ahmad Karim, Mohd Faizal Ab Razak Clicked:11473 Download:6189 Cited:0 <Full Text> <PPT> 2601 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.6 P.712-736 DOI:10.1631/FITEE.1601491 |
| 58 | A numerical study on the high-velocity impact behavior of pressure pipes Author(s):Zhen-yu Wang, Yang Zhao, Guo-wei Ma, Zhi-guo He Clicked:7334 Download:5232 Cited:1 <Full Text> <PPT> 2902 Journal of Zhejiang University Science A 2016 Vol.17 No.6 P.443-453 DOI:10.1631/jzus.A1500112 |
| 59 | BORON: an ultra-lightweight and low power encryption design for pervasive computing Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil Clicked:9527 Download:6278 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.3 P.317-331 DOI:10.1631/FITEE.1500415 |
| 60 | Anonymous-address-resolution model Author(s):Guang-jia Song, Zhen-zhou Ji Clicked:9301 Download:5059 Cited:0 <Full Text> <PPT> 2716 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.1044-1055 DOI:10.1631/FITEE.1500382 |
