[1] |
GUO Fan, FAN Weiwei.
Analysis and Verification on SQLIA Vulnerability for Java EE Programs
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(2): 270-283.
|
[2] |
ZHAO Beiying, JI Weifeng, WENG Jiang, SUN Yan, LI Yingqi, WU Xuan.
Trusted Routing Protocol for Flying Ad Hoc Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(12): 2304-2314.
|
[3] |
GU Jianan, ZHENG Beilei, WENG Chuliang.
Survey on Protection Mechanisms for Untrusted Hypervisor in Cloud
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(2): 200-214.
|
[4] |
SHI Jiuchao, LIU Guanfeng, LI Zhixu, LIU An, ZHENG Kai.
Strong Social Graph Based Trustworthy Service Provider Selection in Social Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(9): 1383-1396.
|
[5] |
ZHU Yi, HUANG Zhiqiu, ZHOU Hang.
Formal Method for Verifying BPEL Model Used by Functional Programming Language
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(2): 185-196.
|
[6] |
LI Xiangdong, ZHANG Shaobo, GUO Min, WANG Guojun.
Location Privacy Protection Method Based on Grid
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(8): 1258-1268.
|
[7] |
LI Huiyong, CHEN Yixiang.
STEP: A Spatial-Temporal Event Processing Language for Internet of Vehicles
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(7): 959-974.
|
[8] |
SHI Wenhao, JIANG Guohua, QIN Xiaolin, WANG Sheng.
Access Control Model Research for HDFS Based on User Trust Value
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(1): 25-35.
|
[9] |
XIE Xinqiang, ZHOU Jingang, ZHANG Deyang, XIE Qiuju.
Research on Trust Model of Internetware Based on Complex Network
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(1): 56-64.
|
[10] |
ZHAI Xiang, HE Yeping.
Approach of Usage Control Enforcement Based on Trusted Computing
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(8): 954-962.
|
[11] |
LI Jianjun, ZHANG Rubo, YANG Yu, SU Minyuan.
Method for Finding Trust Relationship Based on Maximum Flow
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(7): 812-820.
|
[12] |
TIAN Yao, QIN Yongbin, XU Daoyun+, ZHANG Li.
TrustSVD Algorithm Based on Double Trust Mechanism
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(11): 1391-1397.
|
[13] |
ZHU Zhengwen, XU Jiafu.
Quantum Programming Language NDQJava2 Processing System: Assembler and Interpreter
[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(8): 762-768.
|
[14] |
YANG Lei, WANG Xingwei, HUANG Min.
Vaccination Immune Genetic Trustworthy QoS Rerouting Scheme
[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(7): 602-610.
|
[15] |
LIU Cuicui, LI Bixin, QI Shanshan, WU Xiaona, SONG Rui.
Research on Trust Evaluation for BPEL Composite Services
[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(4): 337-347.
|