Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 452-455.doi: 10.11896/jsjkx.210900131
• Network & Communication • Previous Articles Next Articles
JIANG Jian-feng1,2, SUN Jin-xia2, YOU Lan-tao3
CLC Number:
[1]LIU F,WANG D D,YU B.Instant messaging system based on 3DES-RC4 hybrid encryption[J].Computer System Application,2020,29(8):80-89. [2]MAO K J,SUN J S,YAN S H.Research on a WSNs Hierarchical Routing Protocol with Balanced Energy Consumption[J].Transducer and Microsystems Technologies,2020,39 (1):24-27,31. [3]YANG J,LIU X L,XU Q.A new clustering routing protocol for heterogeneous wireless sensor networks[J].Transducer and Microsystems Technologies,2020,39(4):121-124,128. [4]CUI Y N,WEI W,HU Y H.Improved LEACH routing based on particle swarm optimization algorithm in WSN[J].Journal of China Academy of Electronics,2019,14(11):1169-1173,1193. [5]WANG X P,WU L B,MIAO F Y.Research on Multi-polynomial Key Distribution Scheme for Wireless Sensor Network[J].Journal of Chinese Computer Systems,2018,39(2):193-196. [6]WEI Q F,YUAN Y Y,HU X D.WSN security model based on the hierarchical security role of backbone nodes[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science),2019,31(5):142-148. [7]YUAN Y Y.Research on hierarchical security model of wireless sensor network based on backbone trusted nodes[D].Chongqing:Chongqing University of Posts and Telecommunications,2018. [8]JI A G,ZHAO J X.The improvement and simulation forLEACH clustering routing protocol[C]//Seventh International Conference on Electronics & Information Engineering.2017. [9]QI H,LV L,CHEN H.LEACH optimization algorithm based on power control and number of clusters[J].Transducer and Microsystems Technologies,2018,37(10):137-139,146. [10]FENG J,KONG J S,WANG G.A clustering single-hop routing protocol for wireless sensor networks based on energy replenishment[J].Computer Science,2020,47(S1):278-282. [11]TAO Z Y,WANG H Z.Non-uniform hierarchical routing protocol for wireless sensor networks based on new clustering[J].Computer Science,2018,45(3):115-123. [12]XIONG C B,DING H W,DONG Z F.A low-latency and low-power WSN clustering algorithm based on LEACH[J].ComputerScience,2020,47(1):258-264. [13]SONG W W.Load balancing mechanism of data center based on particle swarm optimization[J].Nanjing University of Posts and Telecommunications(Natural Science),2019,39(5):81-88. [14]YI M.A secure clustering algorithm for wireless sensor networks based on hybrid PSO[J].Journal of PLA University of Science and Technology (Natural Science Edition),2015(16):433-438. [15]MA S Q,TANG H,LI Y.Data center network traffic scheduling strategy based on particle swarm optimization algorithm[J].Telecommunication Engineering,2021,61(7):865-871. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[3] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[4] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[5] | FAN Xing-ze, YU Mei. Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer [J]. Computer Science, 2022, 49(6A): 628-631. |
[6] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[7] | ZHOU Tian-qing, YUE Ya-li. Multi-Task and Multi-Step Computation Offloading in Ultra-dense IoT Networks [J]. Computer Science, 2022, 49(6): 12-18. |
[8] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[9] | CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497. |
[10] | WANG Guo-wu, CHEN Yuan-yan. Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm [J]. Computer Science, 2021, 48(6A): 313-316. |
[11] | WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342. |
[12] | ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300. |
[13] | GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340. |
[14] | LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332. |
[15] | WANG Yu-chen, QI Wen-hui, XU Li-zhen. Security Cooperation of UAV Swarm Based on Blockchain [J]. Computer Science, 2021, 48(11A): 528-532. |
|