-
741
Scheme of extending elliptic curve method to three phases
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
742
Adversarial attack and defense on graph neural networks: a survey
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
743
QoS routing algorithm based on multiple domain architecture of SDN
Published 2019-10-01“…网络与信息安全学报…”
Get full text
Article -
744
Evolution,characteristics and revelation of the US cyber-security review system
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
745
Analysis model of binary code security flaws based on structure characteristics
Published 2017-09-01“…网络与信息安全学报…”
Get full text
Article -
746
Study of high-speed malicious Web page detection system based on two-step classifier
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
747
Analysis of security extension protocol in e-mail system
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
748
Construction of the content extraction signature scheme based on the thought of the batch scheme
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
749
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
750
Successive memory image analysis method for malicious codes
Published 2017-02-01“…网络与信息安全学报…”
Get full text
Article -
751
Intellectualized forensic technique for Android pattern locks
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
752
Reasoning method for predicting crime partner by using intimacy network of bank accounts
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
753
Regulatory Bitcoin privacy-preserving mixing service
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article -
754
Container intrusion detection method based on host system call frequency
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
755
Toward discovering and exploiting private server-side Web API
Published 2016-12-01“…网络与信息安全学报…”
Get full text
Article -
756
Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era
Published 2017-05-01“…网络与信息安全学报…”
Get full text
Article -
757
Construction of diffusion layers based on cipher structures
Published 2017-06-01“…网络与信息安全学报…”
Get full text
Article -
758
Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
759
Research and development of network representation learning
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
760
Intelligent vulnerability detection system based on graph structured source code slice
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article