..............page:453-460
..............page:461-467
..............page:468-477
Improved fuzzy analysis methods
MA Jinxin;ZHANG Tao;LI Zhoujun;ZHANG Jiangxiao;China Information Technology Security Evaluation Center;School of Computer Science and Engineering;Beihang University;Mathematics and Information Technology Institute;Xingtai University;
..............page:478-483
..............page:484-492
..............page:493-498
..............page:499-503
LBT-based cloud data integrity verification scheme
LI Yong;YAO Ge;LEI Linan;ZHANG Xiaofei;YANG Kun;School of Electronic and Information Engineering;Beijing Jiaotong University;Fujian Provincial Key Laboratory of Network Security and Cryptology;Fujian Normal University;China Information Technology Security Evaluation Center;National Institute of Metrology;
..............page:504-510
..............page:511-516
Mixed-index information system security evaluation
WANG Danchen;XU Yang;LI Bin;HE Xingxing;Intelligent Control Development Center;Southwest Jiaotong University;Sichuan Information Security Testing Evaluation Center;China Information Technology Security Evaluation Center;
..............page:517-521+529
..............page:522-529
Fault diagnostics using DUCG incomplex systems
ZHAO Yue;DONG Chunling;ZHANG Qin;Key Laboratory of Advanced Reactor Engineering and Safety of the Ministry of Education;Collaborative Innovation Center of Advanced Nuclear Energy Technology;Institute of Nuclear and New Energy Technology;Tsinghua University;Department of Computer Science and Technology;Tsinghua University;
..............page:530-537+543
..............page:538-543
..............page:544-552
..............page:553-557
..............page:558-564