[1] |
Shuo WANG, Jun BAI, Bailing WANG, Xu ZHANG, Hongri LIU.
Accelerated traffic replay method based on time compression
[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 178-188.
|
[2] |
Hao ZHAO, Hui SHU, Fei KANG, Ying XING.
High resistance botnet based on smart contract
[J]. Chinese Journal of Network and Information Security, 2021, 7(4): 30-41.
|
[3] |
Jianwei LIU, Dawei LI, Ying GAO, Yu SUN, Hua GUO.
Exploration and practice of PRIDE teaching mode oriented to cybersecurity talent cultivation
[J]. Chinese Journal of Network and Information Security, 2021, 7(4): 183-189.
|
[4] |
Luhui YANG,Huiwen BAI,Guangjie LIU,Yuewei DAI.
Lightweight malicious domain name detection model based on separable convolution
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 112-120.
|
[5] |
JIA Chunfu,LI Ruiqi,TIAN Meiqi,CHENG Xiaoyang.
Discuss on cultivating mode of information security and law inter-disciplinary talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 31-35.
|
[6] |
CHEN Xingshu,WANG Haizhou,WANG Wenxian,YANG Ping,RUAN Shuhua.
Exploring the talent training mode of“cybersecurity doctor”
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 36-43.
|
[7] |
WENG Jian,WEI Linfeng,ZHANG Yue.
Discussion on the cultivation of cyber security talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 44-53.
|
[8] |
CHEN Wei,YIN Zhenqiang,HAN Zhengfu,YU Nenghai.
Quantum information course for the undergraduate students of cyber security
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 81-88.
|
[9] |
Lixun LI,Bin ZHANG,Shuqin DONG.
Host security threat analysis approach for network dynamic defense
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 48-55.
|
[10] |
Qiang QU, Hongtao YU, Ruiyang HUANG.
Research progress of abnormal user detection technology in social network
[J]. Chinese Journal of Network and Information Security, 2018, 4(3): 13-23.
|
[11] |
Dequan YANG,Weimin LIU,Zhou YU.
Research on active defense application based on honeypot
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 57-62.
|
[12] |
Jian WENG,Chang-she MA,Liang GU.
Discussions on the talent cultivation of cyber security
[J]. Chinese Journal of Network and Information Security, 2016, 2(2): 1-7.
|
[13] |
Gan-sen ZHAO,Jie-chao WU,Zi-hao CHEN,Xue-qi REN,Hao-xiang TAN,Zhao-hui MA.
Research on cyberspace security situation awareness
[J]. Chinese Journal of Network and Information Security, 2016, 2(10): 29-35.
|
[14] |
Ning ZHANG,Hui LI.
Study on designation of cyber information assurance education in USA
[J]. Chinese Journal of Network and Information Security, 2016, 2(1): 6-11.
|
[15] |
Hui LI,Ning ZHANG.
Suggestions on cyber security talents cultivation
[J]. Chinese Journal of Network and Information Security, 2015, 1(1): 18-23.
|