-
1
Analysis of the application for the DFD authoring usage possibilities
Published 2024-03-01Subjects: “…data flow diagrams…”
Get full text
Article -
2
Botnets’ similarity analysis based on communication features and D-S evidence theory
Published 2011-01-01Subjects: Get full text
Article -
3
Binary program taint analysis optimization method based on function summary
Published 2023-04-01Subjects: Get full text
Article -
4
Development of Heterogeneous Network and Wi-Fi Technology Will Effectively Address the Issue of Large Quantity of Data Service
Published 2012-09-01Subjects: Get full text
Article -
5
Research on cross-domain access control technology
Published 2021-02-01Subjects: “…cross-domain data flow…”
Get full text
Article -
6
Graph database based security protection mechanism of 5G network data flow
Published 2021-04-01Subjects: Get full text
Article -
7
Extended access control mechanism for cross-domain data exchange
Published 2019-07-01Subjects: Get full text
Article -
8
Bypass node non-redundant adding algorithm for crossing-level data transmission in two-dimension reconfigurable cell array
Published 2015-04-01Subjects: Get full text
Article -
9
Analysis on the development trend of EU data protection legislation reform
Published 2016-02-01Subjects: Get full text
Article -
10
LEO satellite Internet resource allocation strategy based on terminal traffic prediction
Published 2024-07-01Subjects: Get full text
Article -
11
Redundancy and conflict detection method for label-based data flow control policy
Published 2023-10-01Subjects: Get full text
Article -
12
Multilevel tree optical switching network technology in smart substation
Published 2015-12-01Subjects: Get full text
Article -
13
Enhanced method based on virtual registers rotation
Published 2018-05-01Subjects: Get full text
Article -
14
Research and implementation of mobile DPI association algorithm with big data technology
Published 2017-12-01Subjects: Get full text
Article