-
7441
Malicious domain name detection method based on associated information extraction
Published 2021-10-01“…Tongxin xuebao…”
Get full text
Article -
7442
-
7443
Pilot allocation based on user location information in massive MIMO systems
Published 2017-08-01“…Tongxin xuebao…”
Get full text
Article -
7444
Blockchain address risk behavior identification algorithm based on neural differential equations
Published 2024-10-01“…Tongxin xuebao…”
Get full text
Article -
7445
-
7446
Survey of the intelligent and connected vehicle cybersecurity
Published 2020-06-01“…Tongxin xuebao…”
Get full text
Article -
7447
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01“…Tongxin xuebao…”
Get full text
Article -
7448
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01“…Tongxin xuebao…”
Get full text
Article -
7449
-
7450
-
7451
-
7452
Data provision for IoT searches:an auction approach
Published 2015-12-01“…Tongxin xuebao…”
Get full text
Article -
7453
-
7454
Online trace anonymization based on anonymous flow table
Published 2016-11-01“…Tongxin xuebao…”
Get full text
Article -
7455
-
7456
-
7457
BotCatcher:botnet detection system based on deep learning
Published 2018-08-01“…Tongxin xuebao…”
Get full text
Article -
7458
-
7459
Convolutive blind separation algorithm based on complex Givens matrix and bat optimization
Published 2016-07-01“…Tongxin xuebao…”
Get full text
Article -
7460