-
61
Survey of key management schemes for cluster networks
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
62
Unknown attack detection model based on network behavior analysis
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
63
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
64
Design and application of electrocardiograph diagnosis system based on multifractal theory
Published 2017-10-01“…网络与信息安全学报…”
Get full text
Article -
65
Elliptic curve ElGamal encryption based location privacy-preserving scheme
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
66
-
67
-
68
Lightweight authentication protocol for security vehicle network of railway freight train
Published 2018-11-01“…网络与信息安全学报…”
Get full text
Article -
69
Population surveillance and trend alert analysis of mass gatherings
Published 2017-12-01“…网络与信息安全学报…”
Get full text
Article -
70
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
71
Information service identity generation and management scheme for service supervision
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
72
Research on OLE object vulnerability analysis for RTF file
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article -
73
Survey on intellectual property protection for deep learning model
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
74
Research on dynamic migration of critical virtual machines for multi-tenancy
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
75
Research on Windows memory protection mechanism
Published 2017-10-01“…网络与信息安全学报…”
Get full text
Article -
76
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
77
Construction of network ecological civilization based on the anti-terrorism of colleges and universities
Published 2017-06-01“…网络与信息安全学报…”
Get full text
Article -
78
Collaborative security assessment of cloud-edge-device distributed systems based on order parameters
Published 2024-06-01“…网络与信息安全学报…”
Get full text
Article -
79
D2D data sharing partner selection mechanism based on privacy degree and stability degree
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
80
Information acquisition strategy for security gate-ways based on swing door trending algorithm
Published 2018-10-01“…网络与信息安全学报…”
Get full text
Article