[1] |
SHI Zicheng, LI Xin, TANG Ying, HUANG Shanguo.
Optical Packet Filtering System Based on All-Optical Pattern Matching
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 96-101.
|
[2] |
YANG Hongyu, YUAN Haihang, ZHANG Liang.
A Risk Assessment Method of Network Host Node with Host Importance
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(2): 16-21.
|
[3] |
ZHANG Lei, CHEN Chuan, TAN Qi-yun, HAO Mao-xin, YANG Xue-kang.
An Image Encryption Algorithm Combining S-Box and Chaotic Mapping
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(6): 40-47.
|
[4] |
YANG Hong-yu, ZHANG Le, ZHANG Liang.
An Information System Risk Assessment Method Based on Risk Propagation
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 41-48.
|
[5] |
TANG Hong-wei, FENG Sheng-zhong, ZHAO Xiao-fang.
TOChain: a High-Performance SFC for Virtual Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 70-80.
|
[6] |
ZHAO Jian, WANG Rui, LI Zheng-min, LEI Min, MA Min-yao.
Security Threats and Risk Assessment of IoT System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 135-139.
|
[7] |
LEI Min, LIU Xiao-ming, ZHANG Hong, WANG Mian, YANG Yu.
Research on Security Threats and Risk Assessment of Web Information System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 87-93.
|
[8] |
LI Xu, BAO Jing-jing, LIU Ying.
Formation Security: Black Hole Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 12-17.
|
[9] |
BAI Yuan, WANG Qian, JIA Qi-lan, ZHANG Hui-bing.
An Efficient and Secured AKA for EPS Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 10-14.
|
[10] |
LIU Jing, GU Li-ze, Niu Xin-xin, YANG Yi-xian, LI Zhong-xian.
Network Security Events Analyze Method Based on Neural Networks and Genetic Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 50-54.
|
[11] |
FU Yu, CHEN Yong-qiang, WU Xiao-ping, SONG Yan.
Network Attack-Defense Strategies Selection Based on Stochastic Game Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 35-39.
|
[12] |
CHEN Yong-qiang, WU Xiao-ping, FU Yu, SONG Yan.
Network Security Evaluation Based on Stochastic Game and Network Entropy
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 92-96.
|
[13] |
GE Hai-hui, ZHENG Shi-hui, CHEN Tian-ping, YANG Yi-xian.
Fuzzy Risk Assessment of Information Security Threat Scenario
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 89-92,107.
|
[14] |
.
Network Security Assessment Based on Node Correlated HMM
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 121-124.
|
[15] |
WU Huan, PAN Lin, WANG Xiao-zhen, XU Rong-sheng.
A Risk Assessment Model Using Incomplete Attack Graphs Analysis
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(3): 57-61.
|