Advanced Search



11 results found in all.
index Title
1Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Author(s):Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI  Clicked:14253  Download:5482  Cited:8  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.2 P.119-129  DOI:10.1631/jzus.C0910488
2Moving target defense: state of the art and characteristics
Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG  Clicked:9741  Download:7276  Cited:1  <Full Text>  <PPT> 2761
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.11 P.1122-1153  DOI:10.1631/FITEE.1601321
3Enterprise-level business component identification in business architecture integration
Author(s):Jiong Fu, Xue-shan Luo, Ai-min Luo, Jun-xian Liu  Clicked:9102  Download:4335  Cited:0  <Full Text>  <PPT> 2482
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.9 P.1320-1335  DOI:10.1631/FITEE.1601836
4Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing  Clicked:9556  Download:4197  Cited:0  <Full Text>  <PPT> 2732
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
5Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties
Author(s):Yang Chen, Hong-chao HU, Guo-zhen Cheng  Clicked:11070  Download:4691  Cited:0  <Full Text>  <PPT> 2839
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
6Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li  Clicked:8025  Download:4286  Cited:0  <Full Text>  <PPT> 2516
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
7Transcriptional memory and response to adverse temperatures in plants
Author(s):Wei XIE, Qianqian TANG, Fei YAN, Zeng TAO  Clicked:5748  Download:5153  Cited:0  <Full Text>  <PPT> 2216
Journal of Zhejiang University Science B  2021 Vol.22 No.10 P.791-804  DOI:10.1631/jzus.B2100287
8OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense
Author(s):Dandan WU, Jie CHEN, Ruiyun XIE, Ke CHEN  Clicked:3303  Download:2546  Cited:0  <Full Text>  <PPT> 807
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1209-1225  DOI:10.1631/FITEE.2300662
9A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng SHI, Yang ZHAI, Yahong HAN, Qinghua HU  Clicked:3446  Download:5235  Cited:0  <Full Text>  <PPT> 910
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.510-533  DOI:10.1631/FITEE.2300867
10Low-rank matrix recovery with total generalized variation for defending adversarial examples
Author(s):Wen LI, Hengyou WANG, Lianzhi HUO, Qiang HE, Linlin CHEN, Zhiquan HE, Wing W. Y. Ng  Clicked:4239  Download:3566  Cited:0  <Full Text>  <PPT> 471
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.432-445  DOI:10.1631/FITEE.2300017
11Active cybersecurity: vision, model, and key technologies
Author(s):Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG  Clicked:2707  Download:4642  Cited:0  <Full Text>  <PPT> 704
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1243-1278  DOI:10.1631/FITEE.2500053
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE