[1] |
PENG Yu-he, CHEN Xiang, CHEN Shuang-wu, YANG Jian.
Cross-Domain Abnormal Traffic Detection Based on Transfer Learning
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 33-39.
|
[2] |
ZHANG Jun-song, ZHANG Qi-kun, GAN Yong, MENG Ying-hui.
A New Authentication Protocol for Wireless Medical Sensor Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 104-109.
|
[3] |
WU Bin, LIN Xing, LI Wei-dong, LU Tian-liang, ZHANG Dong-mei.
Smartphone Malware Detection Model Based on Artificial Immune System in Cloud Computing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 34-38.
|
[4] |
WANG Xiu-juan, SUN Bo, LIAO Yan-wen, XIANG Cong-bin.
Computer Network Vulnerability Assessment Based on Bayesian Attribute Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 110-116.
|
[5] |
XIE Li-xia, WANG Ya-chao.
New Method of Network Security Situation Awareness
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(5): 31-35.
|
[6] |
LI Jing-hua, MU De-jun, YANG Ming-kun, HU Wei.
Design on Android Malware Behavior Analysis System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 104-107.
|
[7] |
XIE Li-xia, BO Fu-kuan, DENG Qiang.
Multi-Domain Role Trust Access Control Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 83-88.
|
[8] |
GE Hai-hui, ZHENG Shi-hui, CHEN Tian-ping, YANG Yi-xian.
Fuzzy Risk Assessment of Information Security Threat Scenario
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 89-92,107.
|
[9] |
LU Tian-liang, ZHENG Kang-feng, LIU Ying-qing, HU Ying, WU Bin.
Virus Detection Model Based on Dynamic Clonal Selection Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(3): 39-43.
|
[10] |
ZHANG Zhao, TANG Wen, WEN Qiao-yan.
A Length Semantic Constraints Based Approach for Mining Packet Formats of Unknown Protocols
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(6): 55-59.
|
[11] |
.
Network Security Analysis Based on Host-Security-Group
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 19-23.
|
[12] |
.
Research of Automatically Generating Signatures for Botnets
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(4): 109-112.
|
[13] |
Hong-Yu YANG Dai QiKui.
A Novel Approach for Network SelfProtection Mechanism
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(3): 122-126.
|
[14] |
YU Wang-ke; MA Wen-ping; YAN Ya-jun; YANG Yuan-yuan.
Constructing Secure Routing Protocol Using Trust Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(3): 48-51.
|
[15] |
ZHU Hong-liang;LI Rui;CHENG Ming-zhi;XIN Yang;YANG Yi-xian;HU Zheng-ming.
A Multi-Track Separating Method Using Bubble Principle
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(1): 74-79.
|