[1] |
Shuo WANG, Jun BAI, Bailing WANG, Xu ZHANG, Hongri LIU.
Accelerated traffic replay method based on time compression
[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 178-188.
|
[2] |
Hao ZHAO, Hui SHU, Fei KANG, Ying XING.
High resistance botnet based on smart contract
[J]. Chinese Journal of Network and Information Security, 2021, 7(4): 30-41.
|
[3] |
Jin LI, Jin CAO, Yueyu ZHANG, Meiru ZHANG, Hui LI.
Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example
[J]. Chinese Journal of Network and Information Security, 2021, 7(3): 166-174.
|
[4] |
Luhui YANG,Huiwen BAI,Guangjie LIU,Yuewei DAI.
Lightweight malicious domain name detection model based on separable convolution
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 112-120.
|
[5] |
Fenghua LI,Hui LI.
Construction of academic discipline of science and engineering and orientation for their ranking under the new situation
[J]. Chinese Journal of Network and Information Security, 2020, 6(1): 1-10.
|
[6] |
ZHANG Huanguo,DU Ruiying.
Introduction to cyberspace security discipline
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18.
|
[7] |
JIA Chunfu,LI Ruiqi,TIAN Meiqi,CHENG Xiaoyang.
Discuss on cultivating mode of information security and law inter-disciplinary talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 31-35.
|
[8] |
CHEN Xingshu,WANG Haizhou,WANG Wenxian,YANG Ping,RUAN Shuhua.
Exploring the talent training mode of“cybersecurity doctor”
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 36-43.
|
[9] |
WENG Jian,WEI Linfeng,ZHANG Yue.
Discussion on the cultivation of cyber security talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 44-53.
|
[10] |
CHEN Kai,FU Cai,ZOU Deqing,QIANG Weizhong,CUI Yongquan,HAN Lansheng.
Construction of cyberspace security course system of comprehensive practice and graded customs clearance
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 67-74.
|
[11] |
CHEN Wei,YIN Zhenqiang,HAN Zhengfu,YU Nenghai.
Quantum information course for the undergraduate students of cyber security
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 81-88.
|
[12] |
ZHANG Ning,TAN Shichong,FU Xiaotong,DU Xiaogang,LI Hui.
Summary and study on the curriculum reform of modern cryptography based on SPOC and flip classroom
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 89-95.
|
[13] |
Lixun LI,Bin ZHANG,Shuqin DONG.
Host security threat analysis approach for network dynamic defense
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 48-55.
|
[14] |
Qiang QU, Hongtao YU, Ruiyang HUANG.
Research progress of abnormal user detection technology in social network
[J]. Chinese Journal of Network and Information Security, 2018, 4(3): 13-23.
|
[15] |
Ying ZHAO,Zhuo ZHANG,Xiaoru YUAN.
ChinaVis Data Challenge from 2015 to 2017
[J]. Chinese Journal of Network and Information Security, 2018, 4(2): 55-61.
|