[1] |
ZHANG Huanguo,DU Ruiying.
Introduction to cyberspace security discipline
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18.
|
[2] |
XU Tongge,LIU Lianzhong,LIU Jianwei,MAO Jian.
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 19-24.
|
[3] |
HU Aiqun,LI Guyue,PENG Linning,LI Tao.
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 54-66.
|
[4] |
CHEN Kai,FU Cai,ZOU Deqing,QIANG Weizhong,CUI Yongquan,HAN Lansheng.
Construction of cyberspace security course system of comprehensive practice and graded customs clearance
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 67-74.
|
[5] |
QIN Yuhai,LIU Luyuan,GAO Haohang,LIU Shengqiao,DONG Han.
Innovative professional skills competition to create a police practice talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 75-80.
|
[6] |
Hao HU, Yuling LIU, Yuchen ZHANG, Hongqi ZHANG.
Survey of attack graph based network security metric
[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 1-16.
|
[7] |
Juntai HU,Zhenyu WU,Xiao FU,Yichao WANG.
Game model based security strategy of heterogeneous controllers in the cloud
[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 52-59.
|
[8] |
Binghao YAN,Guodong HAN.
Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm
[J]. Chinese Journal of Network and Information Security, 2018, 4(7): 48-59.
|
[9] |
Qiang QU, Hongtao YU, Ruiyang HUANG.
Spammer detection technology of social network based on graph convolution network
[J]. Chinese Journal of Network and Information Security, 2018, 4(5): 39-46.
|
[10] |
Wenyan LIU,Shumin HUO,Qing TONG,Miao ZHANG,Chao QI.
Research on models of network security evaluation and analysis
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 1-11.
|
[11] |
Quan REN,Lei HE,Jiangxing WU.
Analysis of different anti-interference system models based on discrete time Markov chain
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 30-37.
|
[12] |
Haocheng ZHANG,Xiaojie WU,Xiang TANG,Runxuan SHU,Tianchen DING,Xiaoju DONG.
System detecting network anomaly with visualization techniques
[J]. Chinese Journal of Network and Information Security, 2018, 4(2): 40-54.
|
[13] |
Jialin WANG, Jiqiang LIU, Di ZHAO, Yingdi WANG, Yingxiao XIANG, Tong CHEN, Endong TONG, Wenjia NIU.
Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
[J]. Chinese Journal of Network and Information Security, 2018, 4(11): 57-68.
|
[14] |
Yuquan JIN, Bin XIE, Yi ZHU.
Method of botnet network nodes detection base on communication similarity
[J]. Chinese Journal of Network and Information Security, 2018, 4(10): 31-38.
|
[15] |
Zhenping LU,Fucai CHEN,Guozhen CHENG.
Design and implementation of the controller scheduling-time in SDN
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 36-44.
|