[1] |
LIU Han.
Spam Web Detection Based on Hybrid-Sampling and Genetic Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(6): 111-117.
|
[2] |
WANG Si-qi, MIAO Si-wei, ZHANG Xiao-ling, SHI Zhi-qiang, LU Xin-dai.
Static Vulnerability Detection Technology for the Embedded Firmware Web Code Based on D-S Evidence Theory
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 91-99.
|
[3] |
ZHANG Wen-tao, SHUANG Kai, WAN Neng, ZHAN Shu-bo, SU Sen.
Parallel Routing Algorithm for Call Centers Based on Local Mutual Exclusion
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 48-52.
|
[4] |
ZHOU Chun-ru, LIU Xiao-ming, LEI Min, WU Xu-dong, DENG Shi-qi.
Research on Defense of Slow DDoS Attack on Web Server Application Layer
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 77-80.
|
[5] |
GUI Xiao-lin, LIU Jun, QIAO Yuan-yuan, CHI Mu-cong, LEI Zhen-ming.
Identifying Apps Based on User-Agent and Web-Knowledge
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(2): 102-105.
|
[6] |
ZHANG Long-chang.
Web Services Skyline Query Balancing the Benefits and Risks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(1): 124-129.
|
[7] |
ZHANG Wen-tao, SHUANG Kai, CHEN Ping, SU Sen, ZHAN Shu-bo.
Distributed CTI System Based on MapReduce Method
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 32-36.
|
[8] |
LEI Min, LIU Xiao-ming, ZHANG Hong, WANG Mian, YANG Yu.
Research on Security Threats and Risk Assessment of Web Information System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 87-93.
|
[9] |
XU Peng, LI Pei, HAO Qing.
Integrated Agile Development Framework for Web Applications
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 94-98.
|
[10] |
MA Hua, HU Zhi-gang.
Client Context-Aware Prediction of QoS for Web Services
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 91-98.
|
[11] |
REN Xiao-min, WANG Qi.
Novel Comprehensive Theoretical Description of Epitaxial Crystal-Growth Modes and the Prediction of "Post S-K Compatible-Heterogeneous-Growth Mode"
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 1-5.
|
[12] |
ZHANG Feng, FU Jun, YANG Guang-hua, JING Yi-xin, TANG Wei.
Research of Web Access Log Analysis of Security Technology
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(2): 93-98.
|
[13] |
WANG Rui, WEI Xiang-lin, WU Li-fa.
A Privacy-Aware Trust Model for Web Service
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(5): 61-65.
|
[14] |
XU Yue-mei, NIU Wen-jia, ZHAO Zhi-jun, TANG Hui, CI Song.
Service Matching Mechanism in Wireless Sensor Network with Extensible WSDL-IO
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(4): 44-49.
|
[15] |
ZHANG Long-chang.
Group Decision Making for Hybrid QoS-Aware Web Service Composition
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(1): 27-30.
|