[1] |
YANG Mengmeng, ZHU Tianqing, ZHOU Wanlei, XIANG Yang. Attacks and Countermeasures in Social Network Data Publishing[J]. ZTE Communications, 2016, 14(S0): 2-9. |
[2] |
LI Shancang, Imed Romdhani, William Buchanan. Password Pattern and Vulnerability Analysis for Web and Mobile Applications[J]. ZTE Communications, 2016, 14(S0): 32-36. |
[3] |
CHEN Kuan-Lin, YANG Chung-Huang. Design and Implementation of Privacy Impact Assessment for Android Mobile Devices[J]. ZTE Communications, 2016, 14(S0): 37-43. |
[4] |
Zhi Liu, Xiang Wang, and Jun Li. From CIA to PDR: A Top-Down Survey of SDN Security for Cloud DCN[J]. ZTE Communications, 2016, 14(1): 54-60. |
[5] |
Feng Ye, Yi Qian. Secure Communication Networks in the Advanced Metering Infrastructure of Smart Grid[J]. ZTE Communications, 2015, 13(3): 13-20. |
[6] |
Shuai Fu, Xiaoyan Wang, Jie Li. An Instance-Learning-Based Intrusion-Detection System forWireless Sensor Networks[J]. ZTE Communications, 2015, 13(2): 7-11. |
[7] |
Seyyed Hamed Fouladi, Raúl Chávez-Santiago, Pål Ander Floor, Ilangko Balasingham, and Tor A. Ramstad. Sensing, Signal Processing, and Communication for WBANs[J]. ZTE Communications, 2014, 12(3): 3-12. |
[8] |
Amir Azodi, David Jaeger, Feng Cheng, and Christoph Meinel. Event Normalization Through Dynamic Log Format Detection[J]. ZTE Communications, 2014, 12(3): 62-66. |
[9] |
Yasha Chen, Jianpeng Zhao, Junmao Zhu, and Fei Yan. Formal Protection Architecture for Cloud Computing System[J]. ZTE Communications, 2014, 12(2): 63-66. |
[10] |
Ghazanfar Ali, Jie Hu, and Bhumip Khasnabish. Software-Defined Data Center[J]. ZTE Communications, 2013, 11(4): 2-7. |
[11] |
Jinhong Yuan, Yixian Yang, and Nanrun Zhou. Guest Editorial: Physical Layer Security forWireless and Quantum Communications[J]. ZTE Communications, 2013, 11(3): 1-2. |
[12] |
Biao He, Xiangyun Zhou, and Thushara D. Abhayapala. Wireless Physical Layer Security with Imperfect Channel State Information: A Survey[J]. ZTE Communications, 2013, 11(3): 11-19. |
[13] |
Syed Taha Ali and Vijay Sivaraman. Methodologies of Secret-Key Agreement Using Wireless Channel Characteristics[J]. ZTE Communications, 2013, 11(3): 20-25. |
[14] |
Nan Yang, Maged Elkashlan, Phee Lep Yeoh, and Jinhong Yuan. An Introduction to Transmit Antenna Selection in MIMOWiretap Channels[J]. ZTE Communications, 2013, 11(3): 26-32. |
[15] |
Xinhua Dong, Ruixuan Li, Wanwan Zhou, Dongjie Liao, and Shuoyi Zhao. Data Security and Privacy in Cloud Storage[J]. ZTE Communications, 2013, 11(2): 18-23. |