-
281
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
282
Research progress of abnormal user detection technology in social network
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
283
Quantum information course for the undergraduate students of cyber security
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
284
Secure deployment strategy of virtual machines based on operating system diversity
Published 2017-10-01“…网络与信息安全学报…”
Get full text
Article -
285
Digital media representation under complex number base and its application on information hiding
Published 2016-12-01“…网络与信息安全学报…”
Get full text
Article -
286
Method for reducing cloud workflow completion time under the task interruption
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
287
Research on metrics models for cloud services information security evaluation
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
288
Survey on vertical federated learning: algorithm, privacy and security
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
289
Review of malware detection and classification visualization techniques
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
290
Research on attack scenario reconstruction method based on causal knowledge discovery
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
291
Efficient three-party authenticated key agreement protocol based on chaotic map
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
292
Encrypted traffic classification method based on convolutional neural network
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
293
Modeling the interrupt transmission process of SR-IOV cryptographic device
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
294
Defense decision-making method based on incomplete information stochastic game
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
295
AMTD:a way of adaptive moving target defense
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
296
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
297
Passive biometric electronic lock via UHF RFID
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
298
Design of blockchain based zero-knowledge proof of location system
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
299
Network slicing deployment method based on isolation level
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
300
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article