-
721
-
722
Improved method of Tor network flow watermarks based on IPD interval
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article -
723
HEVC information hiding approach based on intra prediction modes modulation
Published 2016-09-01“…网络与信息安全学报…”
Get full text
Article -
724
Rapid responsive and efficient multi-valued Byzantine consensus scheme
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
725
Dynamic resource scheduling strategy for 5G network slicing based on improved greedy algorithm
Published 2018-07-01“…网络与信息安全学报…”
Get full text
Article -
726
-
727
Software patch comparison technology through semantic analysis on function
Published 2019-10-01“…网络与信息安全学报…”
Get full text
Article -
728
Survey on the privacy-preserving content based image retrieval
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article -
729
-
730
De-anonymiation method for networks based on DeepLink
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
731
Destruction strategy for disks based on AES encrypted storage
Published 2018-04-01“…网络与信息安全学报…”
Get full text
Article -
732
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
733
Malware prediction technique based on program gene
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
734
Multi-type low-rate DDoS attack detection method based on hybrid deep learning
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
735
Secure controlling method for scalable botnets
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
736
Privacy-preserving mining of association rules based on paillier encryption algorithm
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article -
737
Research on evolution and security risk of Metaverse
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
738
Defense mechanism of SDN application layer against DDoS attack based on API call management
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
739
Location privacy protection for mobile social network
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article -
740
Multidimensional detection and dynamic defense method for link flooding attack
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article