1. 方滨兴.定义网络空间安全[J]. 网络与信息安全学报, 2018, 4(1): 1-7.
FANG B X. Dynamic defense decision method for network real-time confrontation[J]. Chinese Journal of Network and Information Security, 2018,4(1): 1-7.
2. 章峰,史博轩,蒋文保.区块链关键技术及应用研究综述[J]. 网络与信息安全学报, 2018, 4(4): 22-29
ZHANG F, SHI B X, JIANG W B .Review of key technology and its application of blockchain[J]. Chinese Journal of Network and Information Security, 2018,4(4): 22-29.
3. 宋蕾,马春光,段广晗. 机器学习安全及隐私保护研究进展[J]. 网络与信息安全学报, 2018,4(8): 1-11.
SONG L, MA C G, DUAN G H. Machine learning security and privacy: a survey[J]. Chinese Journal of Network and Information Security, 2018,4(8): 1-11.
4. 郭树行.宋子琦.面向征信的区块链模式设计与应用研究[J]. 网络与信息安全学报, 2018,4(4): 63-71.
GUO S H, SONG Z Q.Design and application of blockchain pattern for credit information industry[J]. Chinese Journal of Network and Information Security, 2018,4(4): 63-71.
5. 李颖,马春光.可搜索加密研究进展综述[J]. 网络与信息安全学报, 2018,4(7): 13-21.
LI Y, MA C G. Overview of searchable encryption research[J]. Chinese Journal of Network and Information Security, 2018,4(7): 13-21.
6. 张晓斌, 陈福才, 黄瑞阳.基于CNN和双向LSTM融合的实体关系抽取[J]. 网络与信息安全学报, 2018,4(9): 44-51.
ZHANG X B, CHEN F C, HUANG R Y.Relation extraction based on CNN and Bi-LSTM[J]. Chinese Journal of Network and Information Security, 2018,4(9): 44-51.
7. 王松, 张野, 吴亚东. 网络拓扑结构可视化方法研究与发展[J]. 网络与信息安全学报, 2018,4(2):1-17.
WANG S, ZHANG Y, WU Y D .Survey on network topology visualization[J]. Chinese Journal of Network and Information Security, 2018,4(2): 1-17.
8. 李莉, 周斯琴; 刘芹等. 基于区块链的数字版权交易系统[J]. 网络与信息安全学报, 2018,4(7):22-29.
LI L, ZHOU S Q, LIU Q, et al. Blockchain-based digital copyright trading system[J]. Chinese Journal of Network and Information Security, 2018,4(7): 22-29.
9. 胡鑫鑫, 刘彩霞, 刘树新等. 乔康移动通信网鉴权认证综述[J]. 网络与信息安全学报, 2018,4(12):1-15.
HU X X, LIU C X, LIU S X, et al. Overview of mobile communication network authentication[J]. Chinese Journal of Network and Information Security, 2018,4(12): 1-15.
10. 明拓思宇; 陈鸿昶.文本摘要研究进展与趋势[J]. 网络与信息安全学报, 2018,4(6):1-10.
MINGTUO S Y, CHEN H C. Research progress and trend of text summarization[J]. Chinese Journal of Network and Information Security, 2018,4(6): 1-10.