-
421
Preventing man-in-the-middle attacks in DNS through certificate less signature
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
422
Temporal relation recognition method based on news event fragments
Published 2017-06-01“…网络与信息安全学报…”
Get full text
Article -
423
Mimic cloud service architecture for cloud applications
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
424
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
425
-
426
RSA-based image recognizable adversarial attack method
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
427
Overview of mobile communication network authentication
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
428
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
429
Improved packet classification algorithm based on multidimensional space dynamic division and RFC
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
430
Multiuser secret key generation based on received signal
Published 2018-10-01“…网络与信息安全学报…”
Get full text
Article -
431
Model of cyberspace threat early warning based on cross-domain and collaboration
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
432
Malware classification method based on static multiple-feature fusion
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article -
433
Survey of encrypted malicious traffic detection based on deep learning
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
434
Server-aided access control for cloud computing
Published 2016-10-01“…网络与信息安全学报…”
Get full text
Article -
435
Survey of attack graph based network security metric
Published 2018-09-01“…网络与信息安全学报…”
Get full text
Article -
436
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
437
LSTM network traffic prediction and link congestion warning scheme for single port and single link
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
438
Trust evaluation model of social internet of things based on implicit social relationship
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
439
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
440
Digital steganography model and its formal description
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article