共 50 条
- [41] Research on Algorithm Based on Secure Computer Network Defense [J]. PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 1462 - 1468
- [42] Honeypot-based Defense System Research and Design [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 466 - 470
- [44] A Comprehensive Study of the Bitcoin P2P Network [J]. 2021 3RD CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2021, : 105 - 112
- [45] Authentication and access control in P2P network [J]. GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 468 - 470
- [46] Model the P2P Attack in Computer Networks [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE (LEMCS 2015), 2015, 117 : 1303 - 1307
- [47] Intrusion Detection Method based on Improved BP Neural Network Research [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 193 - 202
- [48] Research and Implementation of Intrusion Detection System Based on Artificial Neural Network [J]. MATERIALS AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2010, 129-131 : 1421 - 1425
- [49] Research and Implementation of Intrusion Detection Algorithm Based on BP Neural Network [J]. PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 228 - 232
- [50] A Certificate less-Based Key Distribution Scheme with Multi-KGCs In P2P Networks [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4424 - 4427