-
1801
-
1802
Mimic storage scheme based on regenerated code
Published 2018-04-01“…Tongxin xuebao…”
Get full text
Article -
1803
-
1804
Performance analysis of generalized processor sharing based on fractal leaky bucket regulators
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
1805
-
1806
-
1807
Simple power analysis attack on random pseudo operations
Published 2012-05-01“…Tongxin xuebao…”
Get full text
Article -
1808
-
1809
Least entropy based randomized strategy for wideband spectrum sensing with cooperation
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
1810
Design and implementation ofserver security alarm system in campus network
Published 2014-10-01“…Tongxin xuebao…”
Get full text
Article -
1811
-
1812
-
1813
PhishingAgent: an agentic workflow method for advanced phishing email detection
Published 2024-11-01“…Tongxin xuebao…”
Get full text
Article -
1814
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01“…Tongxin xuebao…”
Get full text
Article -
1815
Three-dimensional spherical model based XML communication protocols security evaluation method
Published 2013-03-01“…Tongxin xuebao…”
Get full text
Article -
1816
-
1817
Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
Published 2016-10-01“…Tongxin xuebao…”
Get full text
Article -
1818
Action recognition method based on fusion of skeleton and apparent features
Published 2022-01-01“…Tongxin xuebao…”
Get full text
Article -
1819
-
1820
Multi-point joint power analysis attack against AES
Published 2016-10-01“…Tongxin xuebao…”
Get full text
Article