-
6361
-
6362
-
6363
Trust chain generating and updating algorithm for dual redundancy system
Published 2017-01-01“…Tongxin xuebao…”
Get full text
Article -
6364
-
6365
Research on alert correlation method based on alert confidence in multi-IDS environment
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
6366
Radio resource and trajectory optimization for UAV assisted communication based on user route
Published 2022-03-01“…Tongxin xuebao…”
Get full text
Article -
6367
-
6368
Influence community search on directed graphs
Published 2024-11-01“…Tongxin xuebao…”
Get full text
Article -
6369
Research on industrial Internet security detection and response based on digital twin
Published 2024-06-01“…Tongxin xuebao…”
Get full text
Article -
6370
-
6371
-
6372
High resolution ISAR imaging algorithm based on compressive sensing
Published 2013-09-01“…Tongxin xuebao…”
Get full text
Article -
6373
-
6374
DDoS attacks detection based on link character
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
6375
-
6376
Non-cooperative signal modulation recognition algorithm based on joint feature parameter extraction
Published 2020-07-01“…Tongxin xuebao…”
Get full text
Article -
6377
Novel algorithm for dynamic bandwidth scheduling in WDM EPON
Published 2012-02-01“…Tongxin xuebao…”
Get full text
Article -
6378
Secure and collaborative spectrum sensing scheme based on audit game
Published 2023-12-01“…Tongxin xuebao…”
Get full text
Article -
6379
-
6380
Research on cryptographic properties of a new S-box based on cellular automaton
Published 2019-05-01“…Tongxin xuebao…”
Get full text
Article