[1] |
TANG Hong-wei, FENG Sheng-zhong, ZHAO Xiao-fang.
TOChain: a High-Performance SFC for Virtual Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 70-80.
|
[2] |
LI Xu, BAO Jing-jing, LIU Ying.
Formation Security: Black Hole Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 12-17.
|
[3] |
BAI Yuan, WANG Qian, JIA Qi-lan, ZHANG Hui-bing.
An Efficient and Secured AKA for EPS Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 10-14.
|
[4] |
LIU Jing, GU Li-ze, Niu Xin-xin, YANG Yi-xian, LI Zhong-xian.
Network Security Events Analyze Method Based on Neural Networks and Genetic Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 50-54.
|
[5] |
FU Yu, CHEN Yong-qiang, WU Xiao-ping, SONG Yan.
Network Attack-Defense Strategies Selection Based on Stochastic Game Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 35-39.
|
[6] |
CHEN Yong-qiang, WU Xiao-ping, FU Yu, SONG Yan.
Network Security Evaluation Based on Stochastic Game and Network Entropy
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 92-96.
|
[7] |
.
Network Security Analysis Based on Host-Security-Group
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 19-23.
|
[8] |
.
Network Security Assessment Based on Node Correlated HMM
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 121-124.
|
[9] |
QIN Hua-Wang Yue-Wei DAI Zhi-Quan WANG.
Security Situation Evaluation of Intrusion Tolerant System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(2): 57-61.
|
[10] |
CHEH Tian-Ping.
Application of Graph Theory in Threat Situation Analysis of Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(1): 113-117.
|
[11] |
XIN Yang, GAO Xue-song, GAO Cheng, YANG Yi-xian .
Design of Safety System to Improve the Qualitative Performance of SSL Protocol
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(6): 89-93.
|
[12] |
WANG Ping, FANG Bin-xing, YUN Xiao-chun.
The Division Based Restraint Approach of Worm Propagation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(5): 24-27.
|
[13] |
ZHANG Zhao-xin, FANG Bin-xing, HU Ming-zeng.
An IDS-Supported Architecture of Information Capture for High-Speed Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(2): 118-122.
|
[14] |
XU Jie-feng.
The Research of Covert Channels Based on TCP/IP
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2003, 26(S1): 144-150.
|
[15] |
LUO Shou-shan 1,CHEN Ya-juan 2,SONG Chuan-heng 2,WANG Zi-liang 2,NIU Xin-xin 2,YANG Yi-xian 2.
An Abnormal Intrusion Detection Model Based on
User's Keystrokes
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2003, 26(4): 85-89.
|