-
81
Encrypted traffic identification scheme based on sliding window and randomness features
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
82
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
83
Selfish mining detection scheme based on the characters of transactions
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
84
Design method of secure computing protocol for deep neural network
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
85
CAT-RFE: ensemble detection framework for click fraud
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
86
Survey on model checking based hardware Trojan detection technology
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
87
Study on the development of the DNS root system
Published 2017-03-01“…网络与信息安全学报…”
Get full text
Article -
88
New collaborative DDoS defense technology based on NFV
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
89
Method for the discovery of IPv6 DNS services based on the dynamic domain name watermarks
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
90
Survey on key technologies for protective DNS service
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
91
Bytecode-based approach for Ethereum smart contract classification
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
92
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
93
Image visualization encryption algorithm based on Shamir threshold secret key sharing
Published 2018-07-01“…网络与信息安全学报…”
Get full text
Article -
94
Research on national security risk assessment model of open government data
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
95
Discovery and research of network security vulnerabilities based on Web application
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
96
Evolutionary game model of information management mechanism for public opinion governance
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
97
Generation-based linguistic steganography with controllable security
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
98
Method of diversity software protection based on fusion compilation
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
99
Research on anonymous identity authentication technology in Fabric
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
100
Analysis of cyberspace security based on game theory
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article