Advanced Search



11 results found in all.
index Title
1Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Author(s):Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI  Clicked:13264  Download:5021  Cited:8  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.2 P.119-129  DOI:10.1631/jzus.C0910488
2Moving target defense: state of the art and characteristics
Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG  Clicked:9098  Download:5854  Cited:1  <Full Text>  <PPT> 2449
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.11 P.1122-1153  DOI:10.1631/FITEE.1601321
3Enterprise-level business component identification in business architecture integration
Author(s):Jiong Fu, Xue-shan Luo, Ai-min Luo, Jun-xian Liu  Clicked:8281  Download:3102  Cited:0  <Full Text>  <PPT> 2185
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.9 P.1320-1335  DOI:10.1631/FITEE.1601836
4Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing  Clicked:8546  Download:3064  Cited:0  <Full Text>  <PPT> 2488
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
5Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties
Author(s):Yang Chen, Hong-chao HU, Guo-zhen Cheng  Clicked:10199  Download:3478  Cited:0  <Full Text>  <PPT> 2585
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
6Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li  Clicked:7098  Download:2959  Cited:0  <Full Text>  <PPT> 2194
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
7Transcriptional memory and response to adverse temperatures in plants
Author(s):Wei XIE, Qianqian TANG, Fei YAN, Zeng TAO  Clicked:4836  Download:3794  Cited:0  <Full Text>  <PPT> 1916
Journal of Zhejiang University Science B  2021 Vol.22 No.10 P.791-804  DOI:10.1631/jzus.B2100287
8OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense
Author(s):Dandan WU, Jie CHEN, Ruiyun XIE, Ke CHEN  Clicked:2156  Download:1256  Cited:0  <Full Text>  <PPT> 411
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1209-1225  DOI:10.1631/FITEE.2300662
9A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng SHI, Yang ZHAI, Yahong HAN, Qinghua HU  Clicked:1948  Download:2390  Cited:0  <Full Text>  <PPT> 437
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.510-533  DOI:10.1631/FITEE.2300867
10Low-rank matrix recovery with total generalized variation for defending adversarial examples
Author(s):Wen LI, Hengyou WANG, Lianzhi HUO, Qiang HE, Linlin CHEN, Zhiquan HE, Wing W. Y. Ng  Clicked:3301  Download:1968  Cited:0  <Full Text>  <PPT> 152
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.432-445  DOI:10.1631/FITEE.2300017
11Active cybersecurity: vision, model, and key technologies
Author(s):Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG  Clicked:676  Download:1457  Cited:0  <Full Text>  <PPT> 306
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1243-1278  DOI:10.1631/FITEE.2500053
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE