Modeling and analysis of Cloud-P2P storage architecture
JIN Shun-fu;WANG Chen-fei;CHEN Ling-ling;HUO Zhan-qiang;School of Information Science and Engineering;Yanshan University;The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;The China United Network Communications Co.;Ltd.;Qinhuangdao Branch;College of Computer Science and Technology;Henan Polytechnic University;
..............page:33-40
..............page:98-103
..............page:104-109
Secure localization scheme against wormhole attack for wireless sensor networks
CHEN Hong-long;WANG Zhi-bo;WANG Zhi;XU Jiang-ming;LI Yan-jun;LIU Li-ping;College of Information and Control Engineering;China University of Petroleum;Computer School;Wuhan University;State Key Laboratory of Industrial Control Technology;Zhejiang University;China Petro Tarim Qilfield Company;College of Computer Science and Technology;Zhejiang University of Technology;School of Electrical Engineering and Automation;Tianjin University;
..............page:110-117
..............page:118-128
..............page:129-134
..............page:135-145
..............page:146-154
..............page:155-166
..............page:167-178
..............page:179-184
Source-controlled OpenFlow data plane
WANG Zhe;LIANG Man-gui;JI Xiao-meng;Fillipus Mateus Abisai;Institute of Information Science;Beijing Jiaotong University;Beijing Key Laboratory of Advanced Information Science and Network Technology;
..............page:185-191
Flow-awared identification model of sophisticated network application
ZHANG Luo-shi;WANG Da-wei;XUE Yi-bo;School of Computer Science and Technology;Harbin University of Science and Technology;National Computer Network Emergency Response Technical Team/Coordination Center of China;Research Institute of Information and Technology;Tsinghua University;National Lab for Information Science and Technology;Tsinghua University;
..............page:192-200
Recognition of PQ stego images based on identifiable statistical feature
LU Ji-cang;LIU Fen-lin;LUO Xiang-yang;ZHANG Yi;School of Navigation and Aerospace Engineering;Zhengzhou Information Science and Technology Institute;State Key Laboratory of Mathematical Engineering and Advanced Computing;School of Cyberspace Security;Zhengzhou Information Science and Technology Institute;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:201-210
Study of the ternary correlation quantum-behaved PSO algorithm
WU Tao;CHEN Xi;YAN Yu-song;Department of Computer Science;Chengdu University of Information Technology;School of Computer Science & Technology;Southwest University for Nationalities;School of Computer Science & Technology;Southwest Jiaotong University;
..............page:211-218
..............page:219-226
..............page:227-235
..............page:236-244
..............page:245-252
..............page:253-261
..............page:262-272
..............page:273-280
..............page:281-286