-
181
Improved RLCE public key encryption scheme based on Polar codes
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
182
Financial phishing detection method based on sensitive characteristics of webpage
Published 2017-02-01“…网络与信息安全学报…”
Get full text
Article -
183
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
184
Research on forensics of privacy violations in cloud environment
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
185
Research of a spam filter based on improved naive Bayes algorithm
Published 2017-03-01“…网络与信息安全学报…”
Get full text
Article -
186
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
187
Privacy-preserving scheme for logistics systems based on 2D code and information hiding
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article -
188
Improvement of the blockchain protocol based on memory-hard function
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
189
GRU-based multi-scenario gait authentication for smartphones
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
190
Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
191
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
192
Network security equipment evaluation based on attack tree with risk fusion
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
193
Community detection in multiplex networks via consensus matrix
Published 2017-09-01“…网络与信息安全学报…”
Get full text
Article -
194
Research on privacy preserving mechanism of attribute-based encryption cloud storage
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
195
Research and application of defense mechanism for prompt injection attack of large language model in financial industry
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
196
Study on shared key management scheme for WSN based on LEACH protocol
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
197
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
198
-
199
Design and analysis of enterprise management system framework based on blockchain
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
200
Analytic provenance for criminal intelligence analysis
Published 2018-02-01“…网络与信息安全学报…”
Get full text
Article