-
241
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
242
RSA-based image recognizable adversarial attack method
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
243
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
244
Multiuser secret key generation based on received signal
Published 2018-10-01“…网络与信息安全学报…”
Get full text
Article -
245
Malware classification method based on static multiple-feature fusion
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article -
246
Server-aided access control for cloud computing
Published 2016-10-01“…网络与信息安全学报…”
Get full text
Article -
247
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
248
Digital steganography model and its formal description
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
249
Tampered text detection via RGB and frequency relationship modeling
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
250
Summary and study on the curriculum reform of modern cryptography based on SPOC and flip classroom
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
251
Research on system log anomaly detection based on deep learning
Published 2019-10-01“…网络与信息安全学报…”
Get full text
Article -
252
-
253
Anonymous group key distribution scheme for the internet of vehicles
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
254
Software diversification method based on binary rewriting
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
255
Method to generate the pseudo random sequence based on the statistical properties
Published 2017-01-01“…网络与信息安全学报…”
Get full text
Article -
256
Robust reinforcement learning algorithm based on pigeon-inspired optimization
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
257
Review of blockchain-based DNS alternatives
Published 2017-03-01“…网络与信息安全学报…”
Get full text
Article -
258
Research of location privacy protection in wireless sensor network
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article -
259
Survey on the visualization technologies of threatening security data in cyber space
Published 2018-02-01“…网络与信息安全学报…”
Get full text
Article -
260
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article