[1] |
Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU.
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 15-38.
|
[2] |
Guyue LI, Aiqun HU.
Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 183-189.
|
[3] |
Jie QIU, Rui HAN, Zhifeng WEI, Zhiyang WANG.
Research of public infrastructure system and security policy in cyberspace
[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 56-67.
|
[4] |
Fu XIAO, Haiping HUANG, Sujun HU, Lijuan SUN.
Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province
[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 1-9.
|
[5] |
ZHANG Huanguo,DU Ruiying.
Introduction to cyberspace security discipline
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18.
|
[6] |
XU Tongge,LIU Lianzhong,LIU Jianwei,MAO Jian.
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 19-24.
|
[7] |
HU Aiqun,LI Guyue,PENG Linning,LI Tao.
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 54-66.
|
[8] |
CHEN Kai,FU Cai,ZOU Deqing,QIANG Weizhong,CUI Yongquan,HAN Lansheng.
Construction of cyberspace security course system of comprehensive practice and graded customs clearance
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 67-74.
|
[9] |
Qiang QU, Hongtao YU, Ruiyang HUANG.
Spammer detection technology of social network based on graph convolution network
[J]. Chinese Journal of Network and Information Security, 2018, 4(5): 39-46.
|
[10] |
Quan REN,Lei HE,Jiangxing WU.
Analysis of different anti-interference system models based on discrete time Markov chain
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 30-37.
|
[11] |
Binxing FANG.
Define cyberspace security
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 1-5.
|
[12] |
De-yu YUAN,Xiao-juan WANG,Jian-chao WAN.
Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era
[J]. Chinese Journal of Network and Information Security, 2017, 3(5): 1-9.
|
[13] |
Fan ZHAO,Xiang-yang LUO,Fen-lin LIU.
Research on cyberspace surveying and mapping technology
[J]. Chinese Journal of Network and Information Security, 2016, 2(9): 1-11.
|
[14] |
Cheng ZHU,Jia-jia MIAO,Han-dong MAO.
Behavior-oriented inside network security situation modeling and analysis
[J]. Chinese Journal of Network and Information Security, 2016, 2(8): 17-22.
|
[15] |
Bin-xing FANG.
A hierarchy model on the research fields of cyberspace security technology
[J]. Chinese Journal of Network and Information Security, 2015, 1(1): 2-7.
|