[1] |
Heli WANG, Qiao YAN.
Selfish mining detection scheme based on the characters of transactions
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114.
|
[2] |
Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU.
Network security of the National Natural Science Foundation of China: today and prospects
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101.
|
[3] |
Fukang XING, Zheng ZHANG, Ran SUI, Sheng QU, Xinsheng JI.
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 121-128.
|
[4] |
Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI.
Design and analysis of intelligent service chain system for network security resource pool
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 175-181.
|
[5] |
Xinya WANG, Guang HUA, Hao JIANG, Haijian ZHANG.
Survey on intellectual property protection for deep learning model
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 1-14.
|
[6] |
Yang WANG, Guangming TANG, Shuo WANG, Jiang CHU.
Defense mechanism of SDN application layer against DDoS attack based on API call management
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 73-87.
|
[7] |
Lijuan LI, Man LI, Hongjun BI, Huachun ZHOU.
Multi-type low-rate DDoS attack detection method based on hybrid deep learning
[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 73-85.
|
[8] |
Tao WANG, Hongchang CHEN.
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
[J]. Chinese Journal of Network and Information Security, 2021, 7(3): 72-84.
|
[9] |
Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO.
Research on security scenarios and security models for 6G networking
[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 28-45.
|
[10] |
QIN Yuhai,LIU Luyuan,GAO Haohang,LIU Shengqiao,DONG Han.
Innovative professional skills competition to create a police practice talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 75-80.
|
[11] |
Hao HU, Yuling LIU, Yuchen ZHANG, Hongqi ZHANG.
Survey of attack graph based network security metric
[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 1-16.
|
[12] |
Juntai HU,Zhenyu WU,Xiao FU,Yichao WANG.
Game model based security strategy of heterogeneous controllers in the cloud
[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 52-59.
|
[13] |
Binghao YAN,Guodong HAN.
Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm
[J]. Chinese Journal of Network and Information Security, 2018, 4(7): 48-59.
|
[14] |
Wenyan LIU,Shumin HUO,Qing TONG,Miao ZHANG,Chao QI.
Research on models of network security evaluation and analysis
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 1-11.
|
[15] |
Bin ZHANG,Zihao LIU,Shuqin DONG,Lixun LI.
App-DDoS detection method using partial binary tree based SVM algorithm
[J]. Chinese Journal of Network and Information Security, 2018, 4(3): 24-34.
|