电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP393.0":
1446 ZHANG Bingtao, WANG Xiaopeng, WANG Lücheng, ZHANG Zhonglin, LI Yanlin, LIU Hu
  Intrusion Detection Method for MANET Based on Graph Theory
    JEIT   2018 Vol.40 (6): 1446-1452 [Abstract] (169) [HTML 1 KB] [PDF 505 KB] (582)
763 CHEN Zhuo, FENG Gang, LIU Bei, ZHOU Yang
  Construction Policy of Network Service Chain Oriented to Resource Fragmentation Optimization in Operator Network
    JEIT   2018 Vol.40 (4): 763-769 [Abstract] (187) [HTML 1 KB] [PDF 272 KB] (511)
794 WANG Kai, CHEN Xinhua, CHEN Xi, Wu Zehui
  On the Defense Advantages of Network Address Shuffling Against Different Scanning Attacks
    JEIT   2018 Vol.40 (4): 794-801 [Abstract] (158) [HTML 1 KB] [PDF 817 KB] (410)
802 WANG Jianhua, WANG Guangbo, XU Yang, HU Yixiao, ZHANG Yue, FAN Liwen
  Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    JEIT   2018 Vol.40 (4): 802-810 [Abstract] (117) [HTML 1 KB] [PDF 348 KB] (380)
690 WU Dapeng, WU Guangkai,WANG Ruyan
  Energy-saving Mechanism of Integrated Fiber-wireless Access Network with Uplink Data Frame Aggregation
    JEIT   2018 Vol.40 (3): 690-696 [Abstract] (125) [HTML 1 KB] [PDF 249 KB] (480)
63 ZHOU Weiwei, YU Bin
  Optimal Defense Strategy in WSNs Based on the Game of Multi-stage Intrusion Detection
    JEIT   2018 Vol.40 (1): 63-71 [Abstract] (119) [HTML 1 KB] [PDF 320 KB] (311)
3013 WANG Jianhua, WANG Guangbo, XU Kaiyong
  Ciphertext Policy Attribute-based Encryption Scheme Supporting Attribute Level User Revocation Under Large Universe
    JEIT   2017 Vol.39 (12): 3013-3022 [Abstract] (117) [HTML 1 KB] [PDF 567 KB] (567)
1394 LI Tianze, WU Muqing, WU Yuewei
  High Stability Routing Design Based on the Node Status Predicting
    JEIT   2017 Vol.39 (6): 1394-1400 [Abstract] (149) [HTML 1 KB] [PDF 275 KB] (465)
1401 WANG Ruyan, CHI Wenxiang, ZHANG Hong
  Adaptive Traffic Shaping Policy Based on Token Bucket Algorithm of Wireless-optical Broadband Access Network
    JEIT   2017 Vol.39 (6): 1401-1408 [Abstract] (97) [HTML 1 KB] [PDF 781 KB] (734)
1007 LIU Jiang, ZHANG Hongqi, YANG Yingjie, WANG Yigong
  A Proactive Network Defense Method Based on Address Hopping for C/S Model
    JEIT   2017 Vol.39 (4): 1007-1011 [Abstract] (171) [HTML 1 KB] [PDF 604 KB] (585)
1012 WANG Ruyan, LIU Kanling, ZHANG Hong
  Collaborative Sleep Mechanism between Cross-domain Node with Load  Transfer in Wireless Optical Broadband Access Network
    JEIT   2017 Vol.39 (4): 1012-1016 [Abstract] (184) [HTML 1 KB] [PDF 240 KB] (531)
509 LIU Jiang, ZHANG Hongqi, YANG Yingjie, WANG Yigong
  Effectiveness Evaluation of Moving Network Defense Based on Host Security State Transition Model
    JEIT   2017 Vol.39 (3): 509-517 [Abstract] (314) [HTML 1 KB] [PDF 665 KB] (771)
525 GUO Xiaojun, CHENG Guang, HU Yifei, Dai Mian
  C&C Information Sharing Scheme in Local Network Based on LLMNR Protocol and Evidential Theory
    JEIT   2017 Vol.39 (3): 525-531 [Abstract] (250) [HTML 1 KB] [PDF 832 KB] (697)
397 WU Zehui, WEI Qiang, REN Kailei, WANG Qingxian
  Dynamic Defense for DDoS Attack Using OpenFlow-based Switch Shuffling Approach
    JEIT   2017 Vol.39 (2): 397-404 [Abstract] (207) [HTML 1 KB] [PDF 2461 KB] (958)
2931 WANG Guangbo, WANG Jianhua
  Research on Cloud Storage Scheme with Attribute-based Encryption
    JEIT   2016 Vol.38 (11): 2931-2939 [Abstract] (308) [HTML 1 KB] [PDF 281 KB] (1014)
2208 HAO Chuangbo, SONG Ping, YANG Cheng, WU Jiangpeng
  Firefly-inspired Synchronicity Algorithm Based on Multi Granularity Phase
    JEIT   2016 Vol.38 (9): 2208-2214 [Abstract] (163) [HTML 1 KB] [PDF 1215 KB] (627)
1865 ZHU Yuna, HAN Jihong, YUAN Lin, GU Wen, FAN Yudan
  Protocol Ciphertext Field Identification by Entropy Estimating
    JEIT   2016 Vol.38 (8): 1865-1871 [Abstract] (278) [HTML 1 KB] [PDF 618 KB] (761)
1872 DAI Zibin, LIU Hangtian
  Efficient Range Matching Method Based on Bloom Filter and Ternary Content Addressable Memory
    JEIT   2016 Vol.38 (8): 1872-1879 [Abstract] (211) [HTML 1 KB] [PDF 780 KB] (632)
1354 WANG Ruyan, LIU Hui, WU Dapeng, ZHANG Yan, XIANG Luoyong
  Low-cost Optical Network Unit Deployment Strategy with Survivability Aware in Hybrid Optical-wireless Broadband Access Networks
    JEIT   2016 Vol.38 (6): 1354-1361 [Abstract] (355) [HTML 1 KB] [PDF 277 KB] (541)
1227 RUI Lanlan, LI Qinming
  Short-term Traffic Flow Prediction Algorithm Based on Combined Model
    JEIT   2016 Vol.38 (5): 1227-1233 [Abstract] (313) [HTML 1 KB] [PDF 841 KB] (1268)
1234 XIONG Gang, HU Yuxiang, DUAN Tong, LAN Julong
  A Dynamic Composition Mechanism for the Security Service Chain Oriented Software Defined Networking
    JEIT   2016 Vol.38 (5): 1234-1241 [Abstract] (238) [HTML 1 KB] [PDF 2076 KB] (937)
332 ZHANG Song, MA Linhua, RU Le, ZHANG Haiwei, TANG Hong, HU Xing
  Multi-hop Hybrid Cooperative Geographic Routing Algorithm with Outage-probability-constrained
    JEIT   2016 Vol.38 (2): 332-339 [Abstract] (201) [HTML 1 KB] [PDF 1201 KB] (498)
2802 Li Tian-ze, Wu Mu-qing, Li Pei-zhe, Liao Wen-xing, Ma Wei
  Ad hoc Network Cooperation Enforcement Model Based on Game Theory
    JEIT   2015 Vol.37 (12): 2802-2807 [Abstract] (347) [HTML 1 KB] [PDF 536 KB] (773)
2642 Liu Jiang, Zhang Hong-qi, Dai Xiang-dong, Wang Yi-gong
  A Proactive Network Defense Model Based on Selfadaptive End Hopping
    JEIT   2015 Vol.37 (11): 2642-2649 [Abstract] (330) [HTML 1 KB] [PDF 450 KB] (1269)
2218 Fan Xiao-shi, Lei Ying-jie, Wang Ya-nan, Guo Xin-peng
  Intuitionistic Fuzzy Reasoning Method in Traffic Anomaly Detection
    JEIT   2015 Vol.37 (9): 2218-2224 [Abstract] (207) [HTML 1 KB] [PDF 298 KB] (802)
2225 Li Shuan-bao, Wang Xue-rui, Fu Jian-ming, Zhang Huan-guo
  User Key Revocation Method for Multi-cloud Service Providers
    JEIT   2015 Vol.37 (9): 2225-2231 [Abstract] (251) [HTML 1 KB] [PDF 338 KB] (633)
2232 Pan Sheng-li, Yang Xi-ru, Zhang Zhi-yong, Qian Feng, Hu Guang-min
  Congestion Link Identification under Multipath Routing for Single-source Networks
    JEIT   2015 Vol.37 (9): 2232-2237 [Abstract] (239) [HTML 1 KB] [PDF 301 KB] (621)
2014 Wang Xiao-mei, Fan Liang, Chen Yan, Hong Xian-qiang
  Header Recovery Algorithm Based on Subset Constraint
    JEIT   2015 Vol.37 (8): 2014-2020 [Abstract] (201) [HTML 1 KB] [PDF 529 KB] (518)
1612 Xiong Hou-ren, Chen Xing-yuan, Zhang Bin, Du Xue-hui
  Scalable Access Control Model Based on Double-tier Role and Organization
    JEIT   2015 Vol.37 (7): 1612-1619 [Abstract] (172) [HTML 1 KB] [PDF 275 KB] (871)
1285 Zhou Huan, Ren Dong, Xu Shou-zhi, Jiang Ting-yao, Huang Zhi-yong
  Research on Energy-efficient Contact Probing in Delay Tolerant Networks
    JEIT   2015 Vol.37 (6): 1285-1290 [Abstract] (359) [HTML 1 KB] [PDF 281 KB] (620)
First page | Prev page | Next page | Last pagePage 1 of 4, 117 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech