-
261
Large-scale resource state monitoring strategy in network function virtualization environment
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
262
Non-equal-width histogram publishing method based on differential privacy
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
263
Binary image steganography method based on layered embedding
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
264
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
265
Relation extraction based on CNN and Bi-LSTM
Published 2018-09-01“…网络与信息安全学报…”
Get full text
Article -
266
Reversible data hiding algorithm based on asymmetric histogram shifting
Published 2019-10-01“…网络与信息安全学报…”
Get full text
Article -
267
Architecture design of multi-protocol controller based on software definition
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
268
NTRU-type fully homomorphic encryption scheme without key switching
Published 2017-01-01“…网络与信息安全学报…”
Get full text
Article -
269
Research on professional learning margin of university information security teachers in China
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
270
Design of security verification platform for the integrated space-ground network
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
271
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
272
Online universal steganalysis system based on multiple pre-trained model
Published 2017-05-01“…网络与信息安全学报…”
Get full text
Article -
273
Video tamper detection method based on nonnegative tensor factorization
Published 2017-06-01“…网络与信息安全学报…”
Get full text
Article -
274
Accelerating cryptographic computation with parallel computing mechanisms in Android platform
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
275
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01“…网络与信息安全学报…”
Get full text
Article -
276
-
277
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
278
Dynamic defense decision method for network real-time confrontation
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
279
Comparative study of anonymous network Tor and I2P
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
280
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article