Advanced Search



17 results found in all.
index Title
1Improving the precision of the keyword-matching pornographic text filtering method using a hybrid model
Author(s):SU Gui-yang, LI Jian-hua, MA Ying-hua, LI Sheng-hong  Clicked:10695  Download:3981  Cited:8  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.9 P.1106-1113  DOI:10.1631/jzus.2004.1106
2Cost management based security framework in mobile ad hoc networks
Author(s):Yang Rui-jun, Xia Qi, Pan Qun-hua, Wang Wei-nong, Li Ming-lu  Clicked:6194  Download:3130  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.4 P.493-501  DOI:10.1631/jzus.2006.A0493
3Improved Feistel-based ciphers for wireless sensor network security
Author(s):Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU  Clicked:7336  Download:6041  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1111-1117  DOI:10.1631/jzus.A0720108
4A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
Author(s):JIANG Xiao-ning, YE Cheng-qing  Clicked:5138  Download:2780  Cited:0  <Full Text>
Journal of Zhejiang University Science  2000 Vol.1 No.3 P.317-321  DOI:10.1631/jzus.2000.0317
5A new data normalization method for unsupervised anomaly intrusion detection
Author(s):Long-zheng Cai, Jian Chen, Yun Ke, Tao Chen, Zhi-gang Li  Clicked:9342  Download:3548  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.778-784  DOI:10.1631/jzus.C0910625
6A 10 Gbps in-line network security processor based on configurable hetero-multi-cores
Author(s):Yun Niu, Li-ji Wu, Yang Liu, Xiang-min Zhang, Hong-yi Chen  Clicked:9004  Download:3809  Cited:2  <Full Text>  <PPT> 2608
Journal of Zhejiang University Science C  2013 Vol.14 No.8 P.642-651  DOI:10.1631/jzus.C1200370
7Botnet detection techniques: review, future trends, and issues
Author(s):Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar  Clicked:20977  Download:21791  Cited:10  <Full Text>  <PPT> 2959
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.943-983  DOI:10.1631/jzus.C1300242
8BORON: an ultra-lightweight and low power encryption design for pervasive computing
Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil  Clicked:7690  Download:4533  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.317-331  DOI:10.1631/FITEE.1500415
9Anonymous-address-resolution model
Author(s):Guang-jia Song, Zhen-zhou Ji  Clicked:7411  Download:2698  Cited:0  <Full Text>  <PPT> 2019
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1044-1055  DOI:10.1631/FITEE.1500382
10A keyed-hashing based self-synchronization mechanism for port address hopping communication
Author(s):Yue-bin Luo, Bao-sheng Wang, Xiao-feng Wang, Bo-feng Zhang  Clicked:8315  Download:2774  Cited:0  <Full Text>  <PPT> 2207
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.5 P.719-728  DOI:10.1631/FITEE.1601548
11Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing  Clicked:7683  Download:2556  Cited:0  <Full Text>  <PPT> 2062
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
12A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
Author(s):Ya Qin, Guo-wei Shen, Wen-bo Zhao, Yan-ping Chen, Miao Yu, Xin Jin  Clicked:8085  Download:2466  Cited:0  <Full Text>  <PPT> 1891
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.872-884  DOI:10.1631/FITEE.1800520
13EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things
Author(s):Weiyong Yang, Wei Liu, Xingshen Wei, Zixin Guo, Kangle Yang, Hao Huang, Longyun Qi  Clicked:6892  Download:6266  Cited:0  <Full Text>  <PPT> 1682
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.3 P.374-399  DOI:10.1631/FITEE.1900636
14Discussion on a new paradigm of endogenous security towards 6G networks
Author(s):Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG  Clicked:3313  Download:10417  Cited:0  <Full Text>  <PPT> 596
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.10 P.1421-1450  DOI:10.1631/FITEE.2200060
15On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things
Author(s):Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI  Clicked:2760  Download:4600  Cited:0  <Full Text>  <PPT> 623
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.2 P.259-274  DOI:10.1631/FITEE.2200188
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE