[1] |
XIAO Jian, LI Wen-jiang, GENG Hong-yang, ZHAI Ying-bo.
An Anti-DoS Attack RFID Security Authentication Protocol in the Internet of Vehicles
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 114-119.
|
[2] |
TANG Hong-wei, FENG Sheng-zhong, ZHAO Xiao-fang.
TOChain: a High-Performance SFC for Virtual Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 70-80.
|
[3] |
LI Xu, BAO Jing-jing, LIU Ying.
Formation Security: Black Hole Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 12-17.
|
[4] |
BAI Yuan, WANG Qian, JIA Qi-lan, ZHANG Hui-bing.
An Efficient and Secured AKA for EPS Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 10-14.
|
[5] |
LIU Jing, GU Li-ze, Niu Xin-xin, YANG Yi-xian, LI Zhong-xian.
Network Security Events Analyze Method Based on Neural Networks and Genetic Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 50-54.
|
[6] |
FU Yu, CHEN Yong-qiang, WU Xiao-ping, SONG Yan.
Network Attack-Defense Strategies Selection Based on Stochastic Game Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 35-39.
|
[7] |
CHEN Yong-qiang, WU Xiao-ping, FU Yu, SONG Yan.
Network Security Evaluation Based on Stochastic Game and Network Entropy
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 92-96.
|
[8] |
.
Network Security Analysis Based on Host-Security-Group
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 19-23.
|
[9] |
ZHENG Kang-feng.
Detecting DDoS Attack with Hurst Parameter of Marginal Spectrum
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(5): 128-132.
|
[10] |
.
Network Security Assessment Based on Node Correlated HMM
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 121-124.
|
[11] |
QIN Hua-Wang Yue-Wei DAI Zhi-Quan WANG.
Security Situation Evaluation of Intrusion Tolerant System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(2): 57-61.
|
[12] |
CHEH Tian-Ping.
Application of Graph Theory in Threat Situation Analysis of Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(1): 113-117.
|
[13] |
XIN Yang, GAO Xue-song, GAO Cheng, YANG Yi-xian .
Design of Safety System to Improve the Qualitative Performance of SSL Protocol
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(6): 89-93.
|
[14] |
.
Design and Implementation of DDoS Attack Fast Detection Online
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(3): 122-125.
|
[15] |
WANG Ping, FANG Bin-xing, YUN Xiao-chun.
The Division Based Restraint Approach of Worm Propagation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(5): 24-27.
|