-
81
Approach on runtime monitoring based on the embedded trusted platforms
Published 2017-10-01“…网络与信息安全学报…”
Get full text
Article -
82
Supply chain dynamic multi-center coordination authentication model based on block chain
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article -
83
Research progress on moving target defense for SDN
Published 2018-07-01“…网络与信息安全学报…”
Get full text
Article -
84
NLP neural network copyright protection based on black box watermark
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
85
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
86
TPEFD:an SDN-based efficient elephant flow detection method
Published 2017-05-01“…网络与信息安全学报…”
Get full text
Article -
87
Novel hybrid strong and weak PUF design based on FPGA
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
88
Lightweight and secure vehicle track verification scheme via broadcast communication channels
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
89
Improve the robustness of algorithm under adversarial environment by moving target defense
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
90
Hypernetwork link prediction method based on the SCL-CMM model
Published 2024-06-01“…网络与信息安全学报…”
Get full text
Article -
91
Survey of intention recognition for opponent modeling
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
92
Dual-stack host discovery method based on SSDP and DNS-SD protocol
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
93
JPEG reversible data hiding method based on optimal DCT frequency embedding
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
94
Ontology model based on security parameters capturing process for network systems
Published 2017-02-01“…网络与信息安全学报…”
Get full text
Article -
95
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article -
96
Routing scheme for key-relaying-based quantum key distribution network in wide-area
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article -
97
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
98
Evaluation method of privacy protection effect based on multi-layer fuzzy comprehensive evaluation
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
99
Biomimetic security model based on immune system control mechanism
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
100
Vulnerability benchmark generation algorithm based on finite state machines
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article