-
141
Research progress on moving target defense for SDN
Published 2018-07-01“…网络与信息安全学报…”
Get full text
Article -
142
NLP neural network copyright protection based on black box watermark
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
143
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
144
TPEFD:an SDN-based efficient elephant flow detection method
Published 2017-05-01“…网络与信息安全学报…”
Get full text
Article -
145
Novel hybrid strong and weak PUF design based on FPGA
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
146
Lightweight and secure vehicle track verification scheme via broadcast communication channels
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
147
Improve the robustness of algorithm under adversarial environment by moving target defense
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
148
Performance evaluation for JPEG compression on model-based source camera identification
Published 2016-09-01“…网络与信息安全学报…”
Get full text
Article -
149
Legislative reflection on critical information infrastructure protection in China
Published 2016-03-01“…网络与信息安全学报…”
Get full text
Article -
150
Hypernetwork link prediction method based on the SCL-CMM model
Published 2024-06-01“…网络与信息安全学报…”
Get full text
Article -
151
Survey of intention recognition for opponent modeling
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
152
Visualization analysis and design of DDoS attack
Published 2017-02-01“…网络与信息安全学报…”
Get full text
Article -
153
Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm
Published 2018-07-01“…网络与信息安全学报…”
Get full text
Article -
154
Optimal structural similarity constraint for reversible data hiding
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
155
Dual-stack host discovery method based on SSDP and DNS-SD protocol
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
156
Malicious user detection in Momo application based on spatio-temporal behavior and static attribute analysis
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
157
JPEG reversible data hiding method based on optimal DCT frequency embedding
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
158
Ontology model based on security parameters capturing process for network systems
Published 2017-02-01“…网络与信息安全学报…”
Get full text
Article -
159
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article -
160
Routing scheme for key-relaying-based quantum key distribution network in wide-area
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article