Showing 1 - 4 results of 4 for search 'HE Haitao', query time: 0.01s
Refine Results
-
1
Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic by WEI Yujun, HE Haitao, ZHAO Qiong, YAO Renlong, LI Enlei
Published 2024-11-01
Article -
2
-
3
Flow-based electronic resource network behavior analysis practice by HE Haitao, LI Enlei, ZHAO Qiong, YAO Renlong, WEI Yujun
Published 2024-11-01
Article -
4
Game-based detection method of broken access control vulnerabilities in Web application by HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng
Published 2024-06-01
Article