Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2016 Issue 11
Design of network intrusion prevention system based on SDN
Gong Jian;Jin Lei;School of Computer Science and Engineering;Southeast University;
..............page:1-6
Vul Tracker platform for vulnerability management and automatic tracking
Zhang Siyu;Jiang Kaida;Network and Information Center;Shanghai Jiao Tong University;
..............page:7-10
Inter-AS source address validation based on source declaration and AS alliance
Jia Yihao;Ren Gang;Liu Ying;Department of Computer Science and Technology;Tsinghua University;Tsinghua National Laboratory for Information Science and Technology;Tsinghua University;Institute for Network Sciences and Cyberspace;Tsinghua University;
..............page:11-15
Tamper detection of numerous web pages based on machine learning
Lai Qingnan;Chen Shiyang;Ma Hao;Zhang Bei;Computer Center;Peking University;School of Electronics Engineering and Computer Science;Peking University;
..............page:16-20
UDP reflection attacks interception based on ACL
Ding Wei;Wang Li;Su Qi;School of Computer Science and Engineering;Southeast University;
..............page:21-25
Method of high reliable data transmission over unidirectional link
Wu Zhigang;Liu Hui;Xue Chen;Institute of Network Technology;Beijing University of Posts and Telecommunications;National Computer Network and Information Security Management Center;
..............page:26-29+38
Intrusion detection and forensic analysis for network security incidents
Gong Jian;Wang Zhuoran;Su Qi;Yang Wang;School of Computer Science and Engineering;Southeast University;
..............page:30-33
Service detection and analysis of HTTP at port 80 based on flow records
Ding Wei;Hong Yan;Xia Zhen;School of Computer Science and Engineering;Southeast University;
..............page:34-38
Leakage test method for sensitive files based on dynamic taint tracking
Li Weiming;He Xuan;Wang Yongjian;School of Computer Science and Technology;Huazhong University of Science and Technology;Key Lab Information Network Security of Ministry of Public Security;The Third Research Institute of Ministry of Public Security;
..............page:39-42+81
Pedestrian tracking algorithm by video surveillance based on ensemble detection
Han Guangxing;Zhang Xuan;Li Chongrong;Institute for Network Sciences and Cyberspace;Tsinghua University;
..............page:43-47
IPTV QoE evaluation method based on data-mining
Li Liang;Qiu Xiaotong;Zhao Qiang;Ma Shaoliang;School of Computer Science and Engineering;University of Electronic Science and Technology of China;UoG-UESTC Joint School;University of Electronic Science and Technology of China;Institute of Computer Application;Chinese Academy of Engineering Physics;
..............page:48-52
Multipath routing research based on traffic measurement under SDN in data center networks
Yang Yang;Yang Jiahai;Wen Haosen;Wang Hui;Institute for the Network Sciences and Cyberspace;Tsinghua University;Department of Information Service;Xi’an Communication Institute;Department of Computer Science;University of Rochester;
..............page:53-58
Performance evaluation on deterministic ethernet based on network calculus
Xiang Yu;Yang Gang;Wang Wei;Wang Wenyong;School of Computer Science and Engineering;University of Electronic Science and Technology of China;Turvey Wheel Network Technology Co.Ltd.;
..............page:59-63
Hybrid beaconless geographic routing protocol
Zhang Yufang;Hong Chao;Xu Weibo;Feng Yong;School of Computer Science;Chongqing University;
..............page:64-69
Kalman filtering fusion algorithm based on long and linear clustering structure
He Bin;Li Gang;Tang Limin;Xu Dianhong;School of Electronics and Information Engineering;Tongji University;
..............page:70-74
Flow table update method based on load balancing for SDN
Wang Xiaomao;Huang Chuanhe;Fan Xiying;He Kai;Computer School;Wuhan University;Collaborative Innovation Center of Geospatial Technology;Wuhan University;
..............page:75-81
Evaluation method of evidence data integrity adaptive for cloud forensics
Hu Bo;Han Zhen;Huang Weiqing;Sun Degang;School of Computer and Information Technology;Beijing Jiaotong University;Institute of Information Engineering;Chinese Academy of Science;
..............page:82-86+96
Technology of simplifying IPv6 address configuration and renumbering
Li Zimu;Fu Yiqi;Hao Hui;Center of Information Technology Service;Tsinghua University;
..............page:87-91
Design and realization of bidirectional authentication sky driver under virtual desktop environment
DengJinsheng;Han Dan;Hu Huili;Information Center;National University of Defense Technology;Computer College;National University of Defense Technology;
..............page:92-96
ABC supporting QoS multicast routing mechanism using niche particle swarm optimization
Ma Lianbo;Hu Shupei;Wang Xingwei;Huang Min;Software College;Northeastern University;College of Computer Science and Engineering;Northeastern University;College of Information Science and Engineering;Northeastern University;
..............page:97-102
Fast communication method between containers based on memory sharing mechanism
Luo Hao;Lu Wenlong;Xue Chen;Institute of Network Technology;Beijing University of Posts and Telecommunications;National Computer Network and Information Security Management Center;
..............page:103-106+122
Secured vehicular communication system based on IPv6
Zhang Lin;Dai Jie;Xu Ke;Meng Zhen;School of Information and Communication Engineering;Beijing University of Posts and Telecommunications;
..............page:107-111
User online detection algorithm based on DNS log analysis
Chang Deliang;Zhang Qianli;Li Xing;Department of Electronic Engineering;Tsinghua University;Information Technology Center;Tsinghua University;
..............page:112-116
University intelligent question answering system based on multi-layer strategy
Long Xinzheng;Zheng Jianning;Ouyang Rongbin;Li Tingyan;Computer Center;Peking University;School of Electronic Engineering and Computer Science;Peking University;
..............page:117-122
Measurement strategy algorithm based on active probing in distributed network
Zhang Pei;Liang Yang;Li Zhengmin;Huang Xiaohong;Institute of Network Technology;Beijing University of Posts and Telecommunications;National Computer Network Emergency Response Technical Team;Coordination Center of China;
..............page:123-126
Experiment equipment energy consumption monitoring platform under IPv6 campus
Gao Honghao;Zhang Kang;Ni Jianyue;Xu Huahu;Computing Center;Shanghai University;School of Computer Engineering and Science;Shanghai University;
..............page:127-132