| index | Title |
| 1 | Improving the precision of the keyword-matching pornographic text filtering method using a hybrid model Author(s):SU Gui-yang, LI Jian-hua, MA Ying-hua, LI Sheng-hong Clicked:12185 Download:4871 Cited:8 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.9 P.1106-1113 DOI:10.1631/jzus.2004.1106 |
| 2 | Cost management based security framework in mobile ad hoc networks Author(s):Yang Rui-jun, Xia Qi, Pan Qun-hua, Wang Wei-nong, Li Ming-lu Clicked:7518 Download:3731 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.4 P.493-501 DOI:10.1631/jzus.2006.A0493 |
| 3 | Improved Feistel-based ciphers for wireless sensor network security Author(s):Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU Clicked:8453 Download:6675 Cited:1 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1111-1117 DOI:10.1631/jzus.A0720108 |
| 4 | A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY Author(s):JIANG Xiao-ning, YE Cheng-qing Clicked:6213 Download:3318 Cited:0 <Full Text> Journal of Zhejiang University Science 2000 Vol.1 No.3 P.317-321 DOI:10.1631/jzus.2000.0317 |
| 5 | A new data normalization method for unsupervised anomaly intrusion detection Author(s):Long-zheng Cai, Jian Chen, Yun Ke, Tao Chen, Zhi-gang Li Clicked:10663 Download:4360 Cited:2 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.10 P.778-784 DOI:10.1631/jzus.C0910625 |
| 6 | A 10 Gbps in-line network security processor based on configurable hetero-multi-cores Author(s):Yun Niu, Li-ji Wu, Yang Liu, Xiang-min Zhang, Hong-yi Chen Clicked:10766 Download:4682 Cited:2 <Full Text> <PPT> 3021 Journal of Zhejiang University Science C 2013 Vol.14 No.8 P.642-651 DOI:10.1631/jzus.C1200370 |
| 7 | Botnet detection techniques: review, future trends, and issues Author(s):Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar Clicked:23143 Download:27382 Cited:10 <Full Text> <PPT> 3759 Journal of Zhejiang University Science C 2014 Vol.15 No.11 P.943-983 DOI:10.1631/jzus.C1300242 |
| 8 | BORON: an ultra-lightweight and low power encryption design for pervasive computing Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil Clicked:9552 Download:6323 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.3 P.317-331 DOI:10.1631/FITEE.1500415 |
| 9 | Anonymous-address-resolution model Author(s):Guang-jia Song, Zhen-zhou Ji Clicked:9318 Download:5091 Cited:0 <Full Text> <PPT> 2727 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.1044-1055 DOI:10.1631/FITEE.1500382 |
| 10 | A keyed-hashing based self-synchronization mechanism for port address hopping communication Author(s):Yue-bin Luo, Bao-sheng Wang, Xiao-feng Wang, Bo-feng Zhang Clicked:10749 Download:4391 Cited:0 <Full Text> <PPT> 2884 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.5 P.719-728 DOI:10.1631/FITEE.1601548 |
| 11 | Game theoretic analysis for the mechanism of moving target defense Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing Clicked:9556 Download:4197 Cited:0 <Full Text> <PPT> 2732 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.2017-2034 DOI:10.1631/FITEE.1601797 |
| 12 | A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Author(s):Ya Qin, Guo-wei Shen, Wen-bo Zhao, Yan-ping Chen, Miao Yu, Xin Jin Clicked:10376 Download:4164 Cited:0 <Full Text> <PPT> 2535 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.872-884 DOI:10.1631/FITEE.1800520 |
| 13 | EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things Author(s):Weiyong Yang, Wei Liu, Xingshen Wei, Zixin Guo, Kangle Yang, Hao Huang, Longyun Qi Clicked:9200 Download:9201 Cited:0 <Full Text> <PPT> 2257 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.3 P.374-399 DOI:10.1631/FITEE.1900636 |
| 14 | Discussion on a new paradigm of endogenous security towards 6G networks Author(s):Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG Clicked:6301 Download:15370 Cited:0 <Full Text> <PPT> 1406 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.10 P.1421-1450 DOI:10.1631/FITEE.2200060 |
| 15 | On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things Author(s):Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI Clicked:4849 Download:7266 Cited:0 <Full Text> <PPT> 1106 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.2 P.259-274 DOI:10.1631/FITEE.2200188 |
