[1] |
Heli WANG, Qiao YAN.
Selfish mining detection scheme based on the characters of transactions
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114.
|
[2] |
Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU.
Network security of the National Natural Science Foundation of China: today and prospects
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101.
|
[3] |
Fukang XING, Zheng ZHANG, Ran SUI, Sheng QU, Xinsheng JI.
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 121-128.
|
[4] |
Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI.
Design and analysis of intelligent service chain system for network security resource pool
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 175-181.
|
[5] |
Xinya WANG, Guang HUA, Hao JIANG, Haijian ZHANG.
Survey on intellectual property protection for deep learning model
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 1-14.
|
[6] |
Yang WANG, Guangming TANG, Shuo WANG, Jiang CHU.
Defense mechanism of SDN application layer against DDoS attack based on API call management
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 73-87.
|
[7] |
Tao WANG, Hongchang CHEN.
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
[J]. Chinese Journal of Network and Information Security, 2021, 7(3): 72-84.
|
[8] |
Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO.
Research on security scenarios and security models for 6G networking
[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 28-45.
|
[9] |
ZHANG Huanguo,DU Ruiying.
Introduction to cyberspace security discipline
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18.
|
[10] |
CHEN Kai,FU Cai,ZOU Deqing,QIANG Weizhong,CUI Yongquan,HAN Lansheng.
Construction of cyberspace security course system of comprehensive practice and graded customs clearance
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 67-74.
|
[11] |
Hao HU, Yuling LIU, Yuchen ZHANG, Hongqi ZHANG.
Survey of attack graph based network security metric
[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 1-16.
|
[12] |
Juntai HU,Zhenyu WU,Xiao FU,Yichao WANG.
Game model based security strategy of heterogeneous controllers in the cloud
[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 52-59.
|
[13] |
Binghao YAN,Guodong HAN.
Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm
[J]. Chinese Journal of Network and Information Security, 2018, 4(7): 48-59.
|
[14] |
Wenyan LIU,Shumin HUO,Qing TONG,Miao ZHANG,Chao QI.
Research on models of network security evaluation and analysis
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 1-11.
|
[15] |
Haocheng ZHANG,Xiaojie WU,Xiang TANG,Runxuan SHU,Tianchen DING,Xiaoju DONG.
System detecting network anomaly with visualization techniques
[J]. Chinese Journal of Network and Information Security, 2018, 4(2): 40-54.
|