[1] |
Luhui YANG,Huiwen BAI,Guangjie LIU,Yuewei DAI.
Lightweight malicious domain name detection model based on separable convolution
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 112-120.
|
[2] |
Fenghua LI,Hui LI.
Construction of academic discipline of science and engineering and orientation for their ranking under the new situation
[J]. Chinese Journal of Network and Information Security, 2020, 6(1): 1-10.
|
[3] |
ZHANG Huanguo,DU Ruiying.
Introduction to cyberspace security discipline
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18.
|
[4] |
JIA Chunfu,LI Ruiqi,TIAN Meiqi,CHENG Xiaoyang.
Discuss on cultivating mode of information security and law inter-disciplinary talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 31-35.
|
[5] |
CHEN Xingshu,WANG Haizhou,WANG Wenxian,YANG Ping,RUAN Shuhua.
Exploring the talent training mode of“cybersecurity doctor”
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 36-43.
|
[6] |
WENG Jian,WEI Linfeng,ZHANG Yue.
Discussion on the cultivation of cyber security talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 44-53.
|
[7] |
CHEN Kai,FU Cai,ZOU Deqing,QIANG Weizhong,CUI Yongquan,HAN Lansheng.
Construction of cyberspace security course system of comprehensive practice and graded customs clearance
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 67-74.
|
[8] |
CHEN Wei,YIN Zhenqiang,HAN Zhengfu,YU Nenghai.
Quantum information course for the undergraduate students of cyber security
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 81-88.
|
[9] |
ZHANG Ning,TAN Shichong,FU Xiaotong,DU Xiaogang,LI Hui.
Summary and study on the curriculum reform of modern cryptography based on SPOC and flip classroom
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 89-95.
|
[10] |
Lixun LI,Bin ZHANG,Shuqin DONG.
Host security threat analysis approach for network dynamic defense
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 48-55.
|
[11] |
Qiang QU, Hongtao YU, Ruiyang HUANG.
Research progress of abnormal user detection technology in social network
[J]. Chinese Journal of Network and Information Security, 2018, 4(3): 13-23.
|
[12] |
Ying ZHAO,Zhuo ZHANG,Xiaoru YUAN.
ChinaVis Data Challenge from 2015 to 2017
[J]. Chinese Journal of Network and Information Security, 2018, 4(2): 55-61.
|
[13] |
Dequan YANG,Weimin LIU,Zhou YU.
Research on active defense application based on honeypot
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 57-62.
|
[14] |
Xiang-shen MIN,Jiu-lun FAN,Xue-feng ZHANG,Yi-xian LIU,Fang REN.
Suggestion on establishing curriculum system for information security major
[J]. Chinese Journal of Network and Information Security, 2016, 2(7): 1-7.
|
[15] |
Hong-li ZHANG,Hai-ning YU,Jian-hong ZHAI,Xiang-zhan YU.
Suggestions on cyber security talents cultivation
[J]. Chinese Journal of Network and Information Security, 2016, 2(3): 1-9.
|