电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP393.08":
794 WANG Kai, CHEN Xinhua, CHEN Xi, Wu Zehui
  On the Defense Advantages of Network Address Shuffling Against Different Scanning Attacks
    JEIT   2018 Vol.40 (4): 794-801 [Abstract] (158) [HTML 1 KB] [PDF 817 KB] (398)
802 WANG Jianhua, WANG Guangbo, XU Yang, HU Yixiao, ZHANG Yue, FAN Liwen
  Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    JEIT   2018 Vol.40 (4): 802-810 [Abstract] (117) [HTML 1 KB] [PDF 348 KB] (368)
63 ZHOU Weiwei, YU Bin
  Optimal Defense Strategy in WSNs Based on the Game of Multi-stage Intrusion Detection
    JEIT   2018 Vol.40 (1): 63-71 [Abstract] (118) [HTML 1 KB] [PDF 320 KB] (302)
3013 WANG Jianhua, WANG Guangbo, XU Kaiyong
  Ciphertext Policy Attribute-based Encryption Scheme Supporting Attribute Level User Revocation Under Large Universe
    JEIT   2017 Vol.39 (12): 3013-3022 [Abstract] (117) [HTML 1 KB] [PDF 567 KB] (558)
1394 LI Tianze, WU Muqing, WU Yuewei
  High Stability Routing Design Based on the Node Status Predicting
    JEIT   2017 Vol.39 (6): 1394-1400 [Abstract] (149) [HTML 1 KB] [PDF 275 KB] (453)
1007 LIU Jiang, ZHANG Hongqi, YANG Yingjie, WANG Yigong
  A Proactive Network Defense Method Based on Address Hopping for C/S Model
    JEIT   2017 Vol.39 (4): 1007-1011 [Abstract] (170) [HTML 1 KB] [PDF 604 KB] (571)
509 LIU Jiang, ZHANG Hongqi, YANG Yingjie, WANG Yigong
  Effectiveness Evaluation of Moving Network Defense Based on Host Security State Transition Model
    JEIT   2017 Vol.39 (3): 509-517 [Abstract] (314) [HTML 1 KB] [PDF 665 KB] (762)
525 GUO Xiaojun, CHENG Guang, HU Yifei, Dai Mian
  C&C Information Sharing Scheme in Local Network Based on LLMNR Protocol and Evidential Theory
    JEIT   2017 Vol.39 (3): 525-531 [Abstract] (250) [HTML 1 KB] [PDF 832 KB] (678)
397 WU Zehui, WEI Qiang, REN Kailei, WANG Qingxian
  Dynamic Defense for DDoS Attack Using OpenFlow-based Switch Shuffling Approach
    JEIT   2017 Vol.39 (2): 397-404 [Abstract] (207) [HTML 1 KB] [PDF 2461 KB] (933)
2931 WANG Guangbo, WANG Jianhua
  Research on Cloud Storage Scheme with Attribute-based Encryption
    JEIT   2016 Vol.38 (11): 2931-2939 [Abstract] (308) [HTML 1 KB] [PDF 281 KB] (995)
1865 ZHU Yuna, HAN Jihong, YUAN Lin, GU Wen, FAN Yudan
  Protocol Ciphertext Field Identification by Entropy Estimating
    JEIT   2016 Vol.38 (8): 1865-1871 [Abstract] (278) [HTML 1 KB] [PDF 618 KB] (735)
1872 DAI Zibin, LIU Hangtian
  Efficient Range Matching Method Based on Bloom Filter and Ternary Content Addressable Memory
    JEIT   2016 Vol.38 (8): 1872-1879 [Abstract] (210) [HTML 1 KB] [PDF 780 KB] (618)
1234 XIONG Gang, HU Yuxiang, DUAN Tong, LAN Julong
  A Dynamic Composition Mechanism for the Security Service Chain Oriented Software Defined Networking
    JEIT   2016 Vol.38 (5): 1234-1241 [Abstract] (238) [HTML 1 KB] [PDF 2076 KB] (918)
2802 Li Tian-ze, Wu Mu-qing, Li Pei-zhe, Liao Wen-xing, Ma Wei
  Ad hoc Network Cooperation Enforcement Model Based on Game Theory
    JEIT   2015 Vol.37 (12): 2802-2807 [Abstract] (346) [HTML 1 KB] [PDF 536 KB] (761)
2642 Liu Jiang, Zhang Hong-qi, Dai Xiang-dong, Wang Yi-gong
  A Proactive Network Defense Model Based on Selfadaptive End Hopping
    JEIT   2015 Vol.37 (11): 2642-2649 [Abstract] (330) [HTML 1 KB] [PDF 450 KB] (1248)
2218 Fan Xiao-shi, Lei Ying-jie, Wang Ya-nan, Guo Xin-peng
  Intuitionistic Fuzzy Reasoning Method in Traffic Anomaly Detection
    JEIT   2015 Vol.37 (9): 2218-2224 [Abstract] (206) [HTML 1 KB] [PDF 298 KB] (789)
2225 Li Shuan-bao, Wang Xue-rui, Fu Jian-ming, Zhang Huan-guo
  User Key Revocation Method for Multi-cloud Service Providers
    JEIT   2015 Vol.37 (9): 2225-2231 [Abstract] (250) [HTML 1 KB] [PDF 338 KB] (621)
1612 Xiong Hou-ren, Chen Xing-yuan, Zhang Bin, Du Xue-hui
  Scalable Access Control Model Based on Double-tier Role and Organization
    JEIT   2015 Vol.37 (7): 1612-1619 [Abstract] (172) [HTML 1 KB] [PDF 275 KB] (855)
1227 Li Jian-Bing, Li Qing, Dong Qing-Kuan, Li Xiao-Ping
  A Chained Multicast Source Authentication Technology Based on the Threshold Cryptography in A Noisy Channel
    JEIT   2015 Vol.37 (5): 1227-1233 [Abstract] (287) [HTML 1 KB] [PDF 301 KB] (533)
2343 Chen Zheng-Yu, Yang Geng, Chen Lei, Zhou Qiang
  Data Gathering for Long Network Lifetime in WSNs Based on Compressed Sensing
    JEIT   2014 Vol.36 (10): 2343-2349 [Abstract] (1297) [HTML 1 KB] [PDF 341 KB] (883)
1743 Zhou Qiang, Yang Geng, Chen Lei, Chen Zheng-Yu, Dai Hua
  Secure Data Aggregation Scheme Based on Homomorphic MAC for Wireless Sensor Networks
    JEIT   2014 Vol.36 (7): 1743-1748 [Abstract] (1283) [HTML 1 KB] [PDF 300 KB] (936)
2630 Ge Hai-Hui, Xiao Da, Chen Tian-Ping, Yang Yi-Xian
  Quantitative Evaluation Approach for Real-time Risk Based on Attack Event Correlating
    JEIT   2013 Vol.35 (11): 2630-2636 [Abstract] (1212) [HTML 1 KB] [PDF 317 KB] (1382)
1739 Li Jin-Ling, Wang Bin-Qiang
  Detecting App-DDoS Attacks Based on Maximal Frequent Sequential Pattern Mining
    JEIT   2013 Vol.35 (7): 1739-1745 [Abstract] (1358) [HTML 1 KB] [PDF 343 KB] (1576)
1277 Zhou Qiang, Yang Geng, Li Sen, Chen Lei
  An Integrity-checking Private Data Aggregation Algorithm
    JEIT   2013 Vol.35 (6): 1277-1283 [Abstract] (1965) [HTML 1 KB] [PDF 286 KB] (1303)
1432 Cao Li-Feng, Chen Xing-Yuan, Du Xue-Hui, Xia Chun-Tao
  A Level Inference Method for Aggregated Information of Objects Based on Clustering Analysis
    JEIT   2012 Vol.34 (6): 1432-1437 [Abstract] (1656) [HTML 1 KB] [PDF 241 KB] (834)
1445 Li Zhen, Tian Jun-Feng, Zhao Peng-Yuan
  A Trustworthy Behavior Model for Software Monitoring Point Based on Classification Attributes
    JEIT   2012 Vol.34 (6): 1445-1451 [Abstract] (1558) [HTML 1 KB] [PDF 300 KB] (722)
3015 Wang Hui-Mei, Xian Ming, Wang Guo-Yu
  A Network Attack Decision-making Algorithm Based on the Extended Attack Graph
    JEIT   2011 Vol.33 (12): 3015-3021 [Abstract] (1737) [HTML 1 KB] [PDF 374 KB] (1265)
2241 Yan Li-Li, Peng Dai-Yuan
  Security Analysis of ARAN Routing Protocol for Ad hoc Networks
    JEIT   2010 Vol.32 (9): 2241-2244 [Abstract] (2215) [HTML 1 KB] [PDF 198 KB] (846)
2245 Li Yi-Nan, Qian Zhi-Hong, Liu Ying, Zhang Xu
  An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory
    JEIT   2010 Vol.32 (9): 2245-2248 [Abstract] (2785) [HTML 1 KB] [PDF 228 KB] (1525)
1469 Yu Yao; Li Zhe; Liu Jun; Liu Cui-xiang; Guo Lei
  A Feasible Dynamic Reputation Evaluation Model in Hierarchical Ad hoc Networks
    JEIT   2010 Vol.32 (6): 1469-1474 [Abstract] (2455) [HTML 1 KB] [PDF 257 KB] (700)
First page | Prev page | Next page | Last pagePage 1 of 2, 50 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech