-
341
Survey on automated vulnerability mining techniques for IoT device firmware
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
342
Social financial information security risk analysis and prevention
Published 2016-03-01“…网络与信息安全学报…”
Get full text
Article -
343
Research on network slicing security for 5G mMTC
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
344
-
345
Webshell malicious traffic detection method based on multi-feature fusion
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
346
Issues of identity verification of typical applications over mobile terminal platform
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
347
Privacy-enhanced federated learning scheme based on generative adversarial networks
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
348
One-time password authentication for one-way communication without re-registration
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
349
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01“…网络与信息安全学报…”
Get full text
Article -
350
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
351
Lightweight malicious domain name detection model based on separable convolution
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
352
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
353
Lightweight authentication method for network interconnection control protocols
Published 2018-11-01“…网络与信息安全学报…”
Get full text
Article -
354
Semantic communication aware reinforcement learning for communication fault-tolerant UAV collaborative control
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
355
Hierarchical proxy consensus optimization for IoV based on blockchain and trust value
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
356
Research on the method of discovering specific organization structure in bank account transaction network
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
357
Multi-party efficient audit mechanism for data integrity based on blockchain
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
358
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
359
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
360
Analysis of the situation and problem on the legislation of cyberspace in China
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article