-
481
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
482
Software diversity evaluating method based on gadget feature analysis
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
483
Secure data collection method of WSN based on mobile Sink
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
484
Data sharing scheme for 5G IoT based on blockchain
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
485
Fair secret sharing scheme using asymmetric bivariate polynomial
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
486
Design and application of blockchain pattern for credit information industry
Published 2018-04-01“…网络与信息安全学报…”
Get full text
Article -
487
Suggestions on cyber security talents cultivation
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article -
488
Modeling and security analysis of hardware trojan attack based on GSCPN
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
489
Survey on anomaly detection technology based on logs
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
490
New image encryption algorithm based on double chaotic system and compressive sensing
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
491
Large-scale measurement and analysis on misconfigurations of DNSSEC from recursive side
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
492
Credit risk identification of high-risk online lending enterprises based on neural network model
Published 2017-12-01“…网络与信息安全学报…”
Get full text
Article -
493
Forgery face detection method based on multi-domain temporal features mining
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
494
Survey of side channel attack on encrypted network traffic
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
495
RAP detection method based on AP fingerprint
Published 2018-05-01“…网络与信息安全学报…”
Get full text
Article -
496
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
497
Constant-round fair rational secret sharing scheme
Published 2017-01-01“…网络与信息安全学报…”
Get full text
Article -
498
Flow consistency in an intensive SDN security architecture with multiple controllers
Published 2017-12-01“…网络与信息安全学报…”
Get full text
Article -
499
Research progress of abnormal user detection technology in social network
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
500
Quantum information course for the undergraduate students of cyber security
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article