-
301
Review of threat discovery and forensic analysis based on system provenance graph
Published 2022-07-01Get full text
Article -
302
Total Seepage Resistance Model of Water-Displacing Diffusion of Slurry in Series and Parallel Fractures
Published 2022-01-01Get full text
Article -
303
Optimal path identification to defend against DDoS attacks
Published 2008-01-01Get full text
Article -
304
STUDY ON PROBABILISTIC SAFETY ASSESSMENT FOR BOX GIRDER OF BRIDGE AND GANTRY CRANE
Published 2017-01-01Get full text
Article -
305
-
306
Study on the Crack Propagation Life of the High-speed Train Gear
Published 2017-01-01Get full text
Article -
307
Training Elements and Basic Methods of Medical Training Therapy
Published 2018-12-01Get full text
Article -
308
Bifurcation Analysis of Three-Strategy Imitative Dynamics with Mutations
Published 2019-01-01Get full text
Article -
309
-
310
5G leading digital technology enables the rapid development of agricultural Internet
Published 2022-11-01Get full text
Article -
311
Energy consumption analysis for WLAN discovery schemes in converged networks
Published 2008-01-01Get full text
Article -
312
On study and implementation of self-similar network traffic
Published 2005-01-01Get full text
Article -
313
-
314
-
315
-
316
Research of Fault Diagnosis Method of Rolling Bearing based on CEEMDAN-DRT
Published 2020-04-01Get full text
Article -
317
Combinatorial double auction-based allocation of retrieval tasks in Internet of Things
Published 2015-12-01Get full text
Article -
318
-
319
Optimal cross-layer power allocation with channel and queue state information
Published 2007-01-01Get full text
Article -
320
Improved ant colony optimization algorithm for solving constraint satisfaction problem
Published 2015-05-01Get full text
Article