-
41
Population surveillance and trend alert analysis of mass gatherings
Published 2017-12-01“…网络与信息安全学报…”
Get full text
Article -
42
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
43
Harnessing self-supervised learning to boost malicious traffic detection with enhanced attention
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
44
Research on dynamic migration of critical virtual machines for multi-tenancy
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
45
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
46
Construction of network ecological civilization based on the anti-terrorism of colleges and universities
Published 2017-06-01“…网络与信息安全学报…”
Get full text
Article -
47
D2D data sharing partner selection mechanism based on privacy degree and stability degree
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
48
Encrypted traffic identification scheme based on sliding window and randomness features
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
49
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
50
Design method of secure computing protocol for deep neural network
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
51
Survey on model checking based hardware Trojan detection technology
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
52
New collaborative DDoS defense technology based on NFV
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
53
Method for the discovery of IPv6 DNS services based on the dynamic domain name watermarks
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
54
Survey on key technologies for protective DNS service
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
55
Bytecode-based approach for Ethereum smart contract classification
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
56
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
57
Evolutionary game model of information management mechanism for public opinion governance
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
58
Method of diversity software protection based on fusion compilation
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
59
Research on anonymous identity authentication technology in Fabric
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
60
Analysis of cyberspace security based on game theory
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article