浏览/检索结果:共5条,第1-5条

已选(0)清除 条数/页:   排序方式:
A practical dynamic integrity protection model 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2082-2091
作者:  Yang, Tao;  Wang, Yonggang;  Tang, Liyong;  Kong, Lingbo;  Hu, Jianbin
收藏  |  浏览/下载:10/0  |  提交时间:2025/08/05
Research on countermeasures against tag spam 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2029-2043
作者:  Wang, Yonggang;  Yan, Hanbing;  Xu, Junfeng;  Hu, Jianbin;  Chen, Zhong
收藏  |  浏览/下载:21/0  |  提交时间:2025/08/05
MEED: A memory-efficient distance bounding protocol with error detection 期刊论文
Cryptology and Information Security Series,2011, 卷号: 6, 页码: 129-143
作者:  Xin, Wei;  Tang, Cong;  Xiong, Hu;  Wang, Yonggang;  Sun, Huiping
收藏  |  浏览/下载:15/0  |  提交时间:2025/08/05
Automatic construction and optimization of layered Network Attack Graph 会议论文
Novel Algorithms and Techniques in Telecommunications and Networking, ELECTR NETWORK, 2008-12-05——2008-12-05
作者:  Wang, Yonggang;  Gui, Nike;  Hu, Jianbin;  Chen, Zhong
收藏  |  浏览/下载:16/0  |  提交时间:2025/08/05
The construction and application of network attack graph 期刊论文
China Communications,2009, 卷号: 6, 期号: 4, 页码: 71-74
作者:  Wang, Yonggang;  Miao, Yi;  Yang, Yang;  Chen, Zhong;  Hu, Jianbin
收藏  |  浏览/下载:8/0  |  提交时间:2025/08/05