CETC网络空间安全技术重点实验室 +028-85169000 Chengdu City,  China


  1. Yang Hui, Rogers T, Gross T. Network inoculation: Heteroclinics and phase transitions in an epidemic model. Chaos, 26(8):083116, 2016.
  2. Yao Hao, Jianfeng Chen, Yue Zhao, Kaijun Wu. Dynamic Defense Mechanism. Press of national defense and industry, 2017
  3. Yu Qin, Jian Zhang, Qiang Wang, Jianfeng Chen. Security Issues in Cloud Computing. Press of national defense and industry, 2017

  1. Zhihong Rao, Kun Lan. Information security technique for industrial controlling systems. Press for national defense and industry. 2014
  2. Jianfeng Chen, Qiang Wang, Miao Wu. Network APT attack and defense strategy. China Information Security. 2012(07)
  3. Jianfeng Chen, Qiang Wang, Jianfeng Wang. Formal security verification of cloud computing virtual environments. China Information Security. 2012(04)
  4. Jianfeng Chen, Kai Long, Minggui Li. Simulation of wireless network situation by celluar automata. Communication Technology, 2014(03)
  5. Jianfeng Chen, Mengqi Zen, Rui Xu. A Novel Investigation on Bionics Computing-driven Applications in Cyberspace Security. Communication Technology, 2016(05)
  6. Jianfeng Chen, Tianying Chen. Evolutionary Approaches of Cyberspace Security Automation Technologies to Systematic Self-Intelligence. China Information Security. 2016(08)
  7. Jianfeng Chen, Hangbo Fan. Research of Ontological Threat Intelligence Sharing in Cyberspace Security. Communication Technology, 2017(12)
  8. Zhihong Rao, Jie Liu, Jianfeng Chen. Research on Large-scale Knowledge Acquisition and Storage for Cyberspace Monitoring and Early Warning. Computer Engineering. 2018(04)
  9. Jianfeng Chen, Yang Hongji. "From data reuse to knowledge reuse in web applications: a survey." Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual. Vol. 2. IEEE, 2016.
  1. Rui Xu, Jianfeng Chen. A corrdinated defense framework for cyberspace security. Communications Technology. 2016(01)
  2. Rui Xu, Jianfeng Chen, Fang Liu. Research on cyberspace security threat intelligence and applications. Communications Technology. 2016(06)
  3. Ming li, Rui Xu. Research of Micro-Architecture Network Security Immunity System Simulation. Communications Technology. 2017(09)
  4. Zhiyong Zhang, Ovidiu Mara, Katerina Argyraki. Network Neutrality Inference. Proc. of ACM SIGCOMM. Chicago, IL, USA, Aug. 2014, 63-74
  5. Zhiyong Zhang, Gaolei Fei, Shengli Pan, Fucai Yu, Guangmin Hu. A Fast Link Delay Distribution Inference Approach Under a Variable Bin Size Model. IEICE Transaction on Communications, 2013, E96-B(2):504-507
  6. Zhiyong Zhang, Gaolei Fei, Fucai Yu,Guangmin Hu. Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees, IEEE Symposium on Computers and Communications, Cappadocia, Turkey, July 2012, 725-731
  7. Shengli Pan, Zhiyong Zhang, Yingjie Zhou, Feng Qian, Guangmin Hu. Identify Congested Links Based on Enlarged State Space. Journal of Computer Science and Technology, 2016, V31(2):350-358
  8. Shengli Pan, Zhiyong Zhang, Fucai Yu, Guangmin Hu. End-to-end Measurements for Network Tomography under Multipath Routing. IEEE Communication Letters, 2014, 18(5):881-884

Contact Us

Please contact us via mail or comments.


Cyberspace Security Technology Key Labortory is a CETC owned scientific and research platform that focus on the state-of-the-art principles and applications of cyberspace security, lead by distinguished chief experts and scientists of domain.

Find Us

You can find our latest publications and program achievements via Internet and other textual sources.

Copyright © 2017. Cyberspace Security Technology Key Labortory of CETC, All rights reserved.