-
501
Insider threat detection based on operational attention and data augmentation
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
502
Secure deployment strategy of virtual machines based on operating system diversity
Published 2017-10-01“…网络与信息安全学报…”
Get full text
Article -
503
Digital media representation under complex number base and its application on information hiding
Published 2016-12-01“…网络与信息安全学报…”
Get full text
Article -
504
Method for reducing cloud workflow completion time under the task interruption
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
505
Research on metrics models for cloud services information security evaluation
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
506
Survey on vertical federated learning: algorithm, privacy and security
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
507
Review of malware detection and classification visualization techniques
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
508
Research on attack scenario reconstruction method based on causal knowledge discovery
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
509
Research on host malcode detection using machine learning
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
510
Survey on static software vulnerability detection for source code
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
511
Efficient three-party authenticated key agreement protocol based on chaotic map
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
512
Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
513
Outsourced attribute-based encryption with policy update
Published 2016-05-01“…网络与信息安全学报…”
Get full text
Article -
514
Encrypted traffic classification method based on convolutional neural network
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
515
Modeling the interrupt transmission process of SR-IOV cryptographic device
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
516
Novel defense based on softmax activation transformation
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
517
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
518
Defense decision-making method based on incomplete information stochastic game
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
519
AMTD:a way of adaptive moving target defense
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
520
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article