-
301
Redundancy and conflict detection method for label-based data flow control policy
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
302
Time series and semantics-based chinese microblog topic detection and tracking method
Published 2016-05-01“…网络与信息安全学报…”
Get full text
Article -
303
Survey on research progress for compute first networking
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
304
-
305
Method for robust enhancement of P2P network
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
306
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
307
Architecture design of re-configurable convolutional neural network on software definition
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
308
Analysis and thought on quantum insert technology
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
309
Fermat point based connectivity restoration strategy in networks
Published 2019-10-01“…网络与信息安全学报…”
Get full text
Article -
310
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
311
Dynamic privacy measurement model and evaluation system for mobile edge crowdsensing
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
312
Development trends of the information technology and cyberspace security
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article -
313
-
314
Information flow integrity measurement method using integrity threat tree
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
315
Cross pattern hiding structured encryption for conjunctive queries
Published 2024-06-01“…网络与信息安全学报…”
Get full text
Article -
316
Improved RLCE public key encryption scheme based on Polar codes
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
317
Rumor detection in social media based on eahanced Transformer
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
318
Research on construction of conditional exception code used in branch obfuscation
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
319
Method for constructing function correspondence between firmware based on candidate function group
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
320
Financial phishing detection method based on sensitive characteristics of webpage
Published 2017-02-01“…网络与信息安全学报…”
Get full text
Article