| index | Title |
| 1 | Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks Author(s):Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI Clicked:14253 Download:5482 Cited:8 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.2 P.119-129 DOI:10.1631/jzus.C0910488 |
| 2 | Moving target defense: state of the art and characteristics Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG Clicked:9741 Download:7276 Cited:1 <Full Text> <PPT> 2761 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.11 P.1122-1153 DOI:10.1631/FITEE.1601321 |
| 3 | Enterprise-level business component identification in business architecture integration Author(s):Jiong Fu, Xue-shan Luo, Ai-min Luo, Jun-xian Liu Clicked:9102 Download:4335 Cited:0 <Full Text> <PPT> 2482 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.9 P.1320-1335 DOI:10.1631/FITEE.1601836 |
| 4 | Game theoretic analysis for the mechanism of moving target defense Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing Clicked:9556 Download:4197 Cited:0 <Full Text> <PPT> 2732 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.2017-2034 DOI:10.1631/FITEE.1601797 |
| 5 | Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties Author(s):Yang Chen, Hong-chao HU, Guo-zhen Cheng Clicked:11070 Download:4691 Cited:0 <Full Text> <PPT> 2839 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.2 P.238-252 DOI:10.1631/FITEE.1800516 |
| 6 | Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li Clicked:8025 Download:4286 Cited:0 <Full Text> <PPT> 2516 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.5 P.731-748 DOI:10.1631/FITEE.1800526 |
| 7 | Transcriptional memory and response to adverse temperatures in plants Author(s):Wei XIE, Qianqian TANG, Fei YAN, Zeng TAO Clicked:5748 Download:5153 Cited:0 <Full Text> <PPT> 2216 Journal of Zhejiang University Science B 2021 Vol.22 No.10 P.791-804 DOI:10.1631/jzus.B2100287 |
| 8 | OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense Author(s):Dandan WU, Jie CHEN, Ruiyun XIE, Ke CHEN Clicked:3303 Download:2546 Cited:0 <Full Text> <PPT> 807 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.9 P.1209-1225 DOI:10.1631/FITEE.2300662 |
| 9 | A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng SHI, Yang ZHAI, Yahong HAN, Qinghua HU Clicked:3446 Download:5235 Cited:0 <Full Text> <PPT> 910 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.4 P.510-533 DOI:10.1631/FITEE.2300867 |
| 10 | Low-rank matrix recovery with total generalized variation for defending adversarial examples Author(s):Wen LI, Hengyou WANG, Lianzhi HUO, Qiang HE, Linlin CHEN, Zhiquan HE, Wing W. Y. Ng Clicked:4239 Download:3566 Cited:0 <Full Text> <PPT> 471 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.3 P.432-445 DOI:10.1631/FITEE.2300017 |
| 11 | Active cybersecurity: vision, model, and key technologies Author(s):Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG Clicked:2707 Download:4642 Cited:0 <Full Text> <PPT> 704 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.8 P.1243-1278 DOI:10.1631/FITEE.2500053 |
