[1] |
SHI Zicheng, LI Xin, TANG Ying, HUANG Shanguo.
Optical Packet Filtering System Based on All-Optical Pattern Matching
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 96-101.
|
[2] |
YANG Hongyu, YUAN Haihang, ZHANG Liang.
A Risk Assessment Method of Network Host Node with Host Importance
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(2): 16-21.
|
[3] |
TANG Hong-wei, FENG Sheng-zhong, ZHAO Xiao-fang.
TOChain: a High-Performance SFC for Virtual Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 70-80.
|
[4] |
LI Xu, BAO Jing-jing, LIU Ying.
Formation Security: Black Hole Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 12-17.
|
[5] |
BAI Yuan, WANG Qian, JIA Qi-lan, ZHANG Hui-bing.
An Efficient and Secured AKA for EPS Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 10-14.
|
[6] |
LIU Jing, GU Li-ze, Niu Xin-xin, YANG Yi-xian, LI Zhong-xian.
Network Security Events Analyze Method Based on Neural Networks and Genetic Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 50-54.
|
[7] |
FU Yu, CHEN Yong-qiang, WU Xiao-ping, SONG Yan.
Network Attack-Defense Strategies Selection Based on Stochastic Game Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 35-39.
|
[8] |
CHEN Yong-qiang, WU Xiao-ping, FU Yu, SONG Yan.
Network Security Evaluation Based on Stochastic Game and Network Entropy
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 92-96.
|
[9] |
.
Network Security Analysis Based on Host-Security-Group
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 19-23.
|
[10] |
.
Network Security Assessment Based on Node Correlated HMM
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 121-124.
|
[11] |
QIN Hua-Wang Yue-Wei DAI Zhi-Quan WANG.
Security Situation Evaluation of Intrusion Tolerant System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(2): 57-61.
|
[12] |
CHEH Tian-Ping.
Application of Graph Theory in Threat Situation Analysis of Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(1): 113-117.
|
[13] |
WANG Ping, FANG Bin-xing, YUN Xiao-chun.
The Division Based Restraint Approach of Worm Propagation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(5): 24-27.
|
[14] |
YANG Wu, FANG Bin-xing, YUN Xiao-chun, ZHANG Hong-li, HU Ming-zeng.
Research and Implementation of a High-Performance Distributed Intrusion Detection System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2004, 27(4): 83-86.
|
[15] |
XU Jie-feng.
The Research of Covert Channels Based on TCP/IP
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2003, 26(S1): 144-150.
|