2023 Vol.9 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
---|---|---|---|---|---|---|
2022 Vol.8 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2021 Vol.7 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2020 Vol.6 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2019 Vol.5 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2018 Vol.4 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2017 Vol.3 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2016 Vol.2 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2015 Vol.1 | No.1 |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (3): 71-77 doi: 10.11959/j.issn.2096-109x.2017.00157 |
Abstract (6070) HTML (88) PDF (169KB)(62276) Knowledge map |
Survey of block chain |
Xin SHEN,Qing-qi PEI,Xue-feng LIU |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (11): 11-20 doi: 10.11959/j.issn.2096-109x.2016.00107 |
Abstract (20659) HTML (2549) PDF (461KB)(28092) Knowledge map |
Study on BGP route leak |
Jia JIA,Zhi-wei YAN,Guang-gang GENG,Jian JIN |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (8): 54-61 doi: 10.11959/j.issn.2096-109x.2016.00074 |
Abstract (3242) HTML (129) PDF (472KB)(20853) Knowledge map |
Research on host malcode detection using machine learning |
Dong ZHANG,Yao ZHANG,Gang LIU,Gui-xiang SONG |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 25-32 doi: 10.11959/j.issn.2096-109x.2017.00179 |
Abstract (2808) HTML (132) PDF (648KB)(12247) Knowledge map |
Supply chain dynamic multi-center coordination authentication model based on block chain |
Jian-ming ZHU,Yong-gui FU |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 27-33 doi: 10.11959/j.issn.2096-109x.2016.00019 |
Abstract (6225) HTML (152) PDF (1052KB)(11182) Knowledge map |
Define cyberspace security |
Binxing FANG |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2018002 |
Abstract (4963) HTML (324) PDF (456KB)(10675) Knowledge map |
Research progress and trend of text summarization |
Tuosiyu MING, Hongchang CHEN |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (6): 1-10 doi: 10.11959/j.issn.2096-109x.2018048 |
Abstract (5685) HTML (92) PDF (568KB)(10119) Knowledge map |
Review of key technology and its application of blockchain |
Feng ZHANG, Boxuan SHI, Wenbao JIANG |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (4): 22-29 doi: 10.11959/j.issn.2096-109x.2018028 |
Abstract (5523) HTML (561) PDF (690KB)(10036) Knowledge map |
Machine learning security and privacy:a survey |
Lei SONG, Chunguang MA, Guanghan DUAN |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (8): 1-11 doi: 10.11959/j.issn.2096-109x.2018067 |
Abstract (6056) HTML (271) PDF (701KB)(9939) Knowledge map |
Analysis and enlightenment on the cybersecurity strategy of various countries in the world |
Yu-xiao LI,Yong-jiang XIE |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2016.00017 |
Abstract (2506) HTML (199) PDF (374KB)(9295) Knowledge map |
Research of phishing detection technology |
Xi ZHANG,Zhi-wei YAN,Hong-tao LI,Guang-gang GENG |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 7-24 doi: 10.11959/j.issn.2096-109x.2017.00180 |
Abstract (2453) HTML (103) PDF (870KB)(8793) Knowledge map |
Symbolic execution based control flow graph extraction method for Android native codes |
Hui-ying YAN,Zhen-ji ZHOU,Li-fa WU,Zheng HONG,He SUN |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 33-46 doi: 10.11959/j.issn.2096-109x.2017.00178 |
Abstract (1686) HTML (13) PDF (619KB)(8213) Knowledge map |
Survey of DDoS defense:challenges and directions |
Fei CHEN,Xiao-hong BI,Jing-jing WANG,Yuan LIU |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (10): 16-24 doi: 10.11959/j.issn.2096-109x.2017.00202 |
Abstract (2612) HTML (83) PDF (555KB)(8194) Knowledge map |
Data security and protection techniques in big data:a survey |
Kai-min WEI,Jian WENG,Kui REN |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (4): 1-11 doi: 10.11959/j.issn.2096-109x.2016.00046 |
Abstract (4029) HTML (128) PDF (1446KB)(8096) Knowledge map |
Machine learning algorithm for intelligent detection of WebShell |
Hua DAI,Jing LI,Xin-dai LU,Xin SUN |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (4): 51-57 doi: 10.11959/j.issn.2096-109x.2017.00126 |
Abstract (2801) HTML (54) PDF (671KB)(8027) Knowledge map |
Suggestions on cyber security talents cultivation |
Hui LI,Ning ZHANG |
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 18-23 doi: 10.11959/j.issn.2096-109x.2015.00003 |
Abstract (2213) HTML (62) PDF (357KB)(7696) Knowledge map |
Malware classification method based on static multiple-feature fusion |
Bo-wen SUN,Yan-yi HUANG,Qiao-kun WEN,Bin TIAN,Peng WU,Qi LI |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (11): 68-76 doi: 10.11959/j.issn.2096-109x.2017.00217 |
Abstract (1705) HTML (82) PDF (529KB)(7545) Knowledge map |
Analysis of cyberspace security based on game theory |
Jian-ming ZHU,Qin WANG |
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 43-49 doi: 10.11959/j.issn.2096-109x.2015.00006 |
Abstract (2176) HTML (70) PDF (764KB)(7094) Knowledge map |
Overview of searchable encryption research |
Ying LI, Chunguang MA |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (7): 13-21 doi: 10.11959/j.issn.2096-109x.2018062 |
Abstract (2089) HTML (119) PDF (592KB)(6944) Knowledge map |
Progress of research on privacy protection for data publication and data mining |
Jiao WANG,Ke-feng FAN,Yong WANG |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 18-26 doi: 10.11959/j.issn.2096-109x.2016.00021 |
Abstract (1517) HTML (18) PDF (965KB)(6779) Knowledge map |
Survey of block chain |
Xin SHEN,Qing-qi PEI,Xue-feng LIU |
Chinese Journal of Network and Information Security.
2016 Vol. 2 (11): 11-20 doi: 10.11959/j.issn.2096-109x.2016.00107 |
Abstract( 20659 ) HTML PDF (461KB) (28092) Knowledge map |
Blockchain-based digital copyright trading system |
Li LI,Siqin ZHOU,Qin LIU,Debiao HE |
Chinese Journal of Network and Information Security.
2018 Vol. 4 (7): 22-29 doi: 10.11959/j.issn.2096-109x.2018060 |
Abstract( 8825 ) HTML PDF (771KB) (4051) Knowledge map |
Relation extraction based on CNN and Bi-LSTM |
Xiaobin ZHANG, Fucai CHEN, Ruiyang HUANG |
Chinese Journal of Network and Information Security.
2018 Vol. 4 (9): 44-51 doi: 10.11959/j.issn.2096-109x.2018074 |
Abstract( 8755 ) HTML PDF (618KB) (4223) Knowledge map |
Supply chain dynamic multi-center coordination authentication model based on block chain |
Jian-ming ZHU,Yong-gui FU |
Chinese Journal of Network and Information Security.
2016 Vol. 2 (1): 27-33 doi: 10.11959/j.issn.2096-109x.2016.00019 |
Abstract( 6225 ) HTML PDF (1052KB) (11182) Knowledge map |
Chinese Journal of Network and Information Security.
2017 Vol. 3 (3): 71-77 doi: 10.11959/j.issn.2096-109x.2017.00157 |
Abstract( 6070 ) HTML PDF (169KB) (62276) Knowledge map |