Showing 1 - 6 results of 6 for search 'Aiqun HU' Skip to content
    • About the Library
    • Rules and Regulations
    • Library Services
    • Library Hours
  • Library News
    • Digital Repository
    • Google Scholar
    • ResearchGate
    • AJoGPL
    • KURJ
    • AJLS
    • MyLOFT
    • Lexis Plus UK
    • Up-to-Date Database
    • Research Support Tools
    • Quick Resource Links
  • Login
Advanced
  • Author
  • Aiqun HU
Showing 1 - 6 results of 6 for search 'Aiqun HU', query time: 0.02s Refine Results
  1. 1
    Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty

    Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty by Guyue LI, Aiqun HU

    Published 2022-04-01
    Get full text
    Article
    Save to List
    Saved in:
  2. 2
    Delegation authorization mechanism with controllable permissions propagation for IoT devices sharing

    Delegation authorization mechanism with controllable permissions propagation for IoT devices sharing by Yubo SONG, Shanshan QI, Aiqun HU

    Published 2019-04-01
    Get full text
    Article
    Save to List
    Saved in:
  3. 3
    Research on bionic mechanism based endogenous security defense system

    Research on bionic mechanism based endogenous security defense system by Aiqun HU, Lanting FANG, Tao LI

    Published 2021-02-01
    Get full text
    Article
    Save to List
    Saved in:
  4. 4
    Android application privacy protection mechanism based on virtual machine bytecode injection

    Android application privacy protection mechanism based on virtual machine bytecode injection by Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU

    Published 2021-06-01
    Get full text
    Article
    Save to List
    Saved in:
  5. 5
    Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security

    Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security by Aiqun HU, Guyue LI, Linning PENG, Tao LI

    Published 2019-06-01
    Get full text
    Article
    Save to List
    Saved in:
  6. 6
    Analysis of communication data of mobile terminal based on protocol reversal

    Analysis of communication data of mobile terminal based on protocol reversal by Mingyuan ZHANG, Xinyu QI, Yubo SONG, Rongrong GU, Aiqun HU, Zhenchao ZHU

    Published 2018-12-01
    Get full text
    Article
    Save to List
    Saved in:

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs