[1] |
LI Yingxin, GUO Zhen, ZHAO Lei, FU Guorui.
Network security of university library information systems based on blockchain hierarchical storage and domestic commercial cryptographic technology
[J]. Shandong Science, 2024, 37(4): 131-135.
|
[2] |
SUN Xuexin, LING Xiang.
Traffic-driven epidemic spreading in two-layer coupled networks
[J]. Shandong Science, 2023, 36(4): 89-96.
|
[3] |
YANG Shu-mian, LIU Jian.
A keyword extraction method based on knowledge granularity
[J]. Shandong Science, 2019, 32(2): 137-142.
|
[4] |
YANG Zi-qi, YANG Shu-mian, WANG Lian-hai.
Design of a cloud forensics middleware system
[J]. SHANDONG SCIENCE, 2018, 31(5): 115-120.
|
[5] |
QIAO Ying-xia, GAO Tian-lei, LIU Zhao-yang, SHAN Ke.
Cloud platform based intelligent health monitoring system and its application
[J]. SHANDONG SCIENCE, 2017, 30(6): 99-104.
|
[6] |
XU Ji-yong, SHU Ming-lei, ZHOU Shu-wang, LIU Bin, GAO Tian-lei.
Design and implementation of intelligent health care service system for elderly based on cloud platform
[J]. SHANDONG SCIENCE, 2017, 30(5): 117-122.
|
[7] |
SHU Ming-lei, GAO Tian-lei, SHAN Ke.
Desigh of bioelectrical impedance detection and analysis system based on cloud platform
[J]. SHANDONG SCIENCE, 2017, 30(4): 118-123.
|
[8] |
YANG Ming, SHU Ming-lei, LIU Rui-xia, CHEN Chang-fang, WEI Nuo.
Design and implementation of the medical cloud system oriented to rural areas
[J]. SHANDONG SCIENCE, 2017, 30(1): 122-127.
|
[9] |
XIA Shaobo,LIAN Lijun,ZOU Jianmei,ZHU Xiaoli.
Regional division based improvement for DVHop localization algorithm
[J]. SHANDONG SCIENCE, 2015, 28(3): 110-116.
|
[10] |
ZHANG Wei,WANG Yongbo,WANG Lu, SUN Meng.
A survey of the controller of software defined network
[J]. SHANDONG SCIENCE, 2015, 28(2): 93-100.
|
[11] |
WEI Fei, YANG Chun-bo, LIU Shou-peng.
Network public opinion analysis oriented semantic similarity algorithm
[J]. SHANDONG SCIENCE, 2014, 27(6): 73-77.
|
[12] |
LI Yan-gai, ZHAO Hua-wei.
PKI based HDFS authentication and secure transmission mechanism
[J]. SHANDONG SCIENCE, 2014, 27(5): 33-41.
|
[13] |
PING Han.
Improved decision tree based intrusion detection algorithm
[J]. SHANDONG SCIENCE, 2014, 27(4): 62-67.
|
[14] |
HU Yun-Xiao, YANG Bo, SUN Tao, GUO Yan-Hai.
Design of a PBOC2.0 oriented smart card operating system
[J]. J4, 2012, 25(5): 73-77.
|
[15] |
HUANG Tai-Bo, ZHAO Hua-Wei, PAN Jin-Qiu, NIE Pei-Yao, YANG Ze-Jun.
A survey of security architecture of ZigBee protocol stack
[J]. J4, 2012, 25(2): 59-66.
|