2024 Vol.10 | No.1 | |||||
---|---|---|---|---|---|---|
2023 Vol.9 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2022 Vol.8 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2021 Vol.7 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2020 Vol.6 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2019 Vol.5 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2018 Vol.4 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2017 Vol.3 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2016 Vol.2 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2015 Vol.1 | No.1 |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (3): 71-77 doi: 10.11959/j.issn.2096-109x.2017.00157 |
Abstract (6100) HTML (89) PDF (169KB)(62383) Knowledge map |
Survey of block chain |
Xin SHEN,Qing-qi PEI,Xue-feng LIU |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (11): 11-20 doi: 10.11959/j.issn.2096-109x.2016.00107 |
Abstract (20816) HTML (2613) PDF (461KB)(28293) Knowledge map |
Study on BGP route leak |
Jia JIA,Zhi-wei YAN,Guang-gang GENG,Jian JIN |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (8): 54-61 doi: 10.11959/j.issn.2096-109x.2016.00074 |
Abstract (3267) HTML (131) PDF (472KB)(20920) Knowledge map |
Research on host malcode detection using machine learning |
Dong ZHANG,Yao ZHANG,Gang LIU,Gui-xiang SONG |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 25-32 doi: 10.11959/j.issn.2096-109x.2017.00179 |
Abstract (2834) HTML (135) PDF (648KB)(12354) Knowledge map |
Supply chain dynamic multi-center coordination authentication model based on block chain |
Jian-ming ZHU,Yong-gui FU |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 27-33 doi: 10.11959/j.issn.2096-109x.2016.00019 |
Abstract (6243) HTML (153) PDF (1052KB)(11300) Knowledge map |
Define cyberspace security |
Binxing FANG |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2018002 |
Abstract (5006) HTML (340) PDF (456KB)(10762) Knowledge map |
Review of key technology and its application of blockchain |
Feng ZHANG, Boxuan SHI, Wenbao JIANG |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (4): 22-29 doi: 10.11959/j.issn.2096-109x.2018028 |
Abstract (5579) HTML (589) PDF (690KB)(10198) Knowledge map |
Research progress and trend of text summarization |
Tuosiyu MING, Hongchang CHEN |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (6): 1-10 doi: 10.11959/j.issn.2096-109x.2018048 |
Abstract (5702) HTML (93) PDF (568KB)(10177) Knowledge map |
Machine learning security and privacy:a survey |
Lei SONG, Chunguang MA, Guanghan DUAN |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (8): 1-11 doi: 10.11959/j.issn.2096-109x.2018067 |
Abstract (6095) HTML (280) PDF (701KB)(10071) Knowledge map |
Analysis and enlightenment on the cybersecurity strategy of various countries in the world |
Yu-xiao LI,Yong-jiang XIE |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2016.00017 |
Abstract (2514) HTML (199) PDF (374KB)(9461) Knowledge map |
Research of phishing detection technology |
Xi ZHANG,Zhi-wei YAN,Hong-tao LI,Guang-gang GENG |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 7-24 doi: 10.11959/j.issn.2096-109x.2017.00180 |
Abstract (2480) HTML (113) PDF (870KB)(8860) Knowledge map |
Symbolic execution based control flow graph extraction method for Android native codes |
Hui-ying YAN,Zhen-ji ZHOU,Li-fa WU,Zheng HONG,He SUN |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 33-46 doi: 10.11959/j.issn.2096-109x.2017.00178 |
Abstract (1708) HTML (14) PDF (619KB)(8309) Knowledge map |
Survey of DDoS defense:challenges and directions |
Fei CHEN,Xiao-hong BI,Jing-jing WANG,Yuan LIU |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (10): 16-24 doi: 10.11959/j.issn.2096-109x.2017.00202 |
Abstract (2632) HTML (90) PDF (555KB)(8214) Knowledge map |
Data security and protection techniques in big data:a survey |
Kai-min WEI,Jian WENG,Kui REN |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (4): 1-11 doi: 10.11959/j.issn.2096-109x.2016.00046 |
Abstract (4054) HTML (132) PDF (1446KB)(8168) Knowledge map |
Machine learning algorithm for intelligent detection of WebShell |
Hua DAI,Jing LI,Xin-dai LU,Xin SUN |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (4): 51-57 doi: 10.11959/j.issn.2096-109x.2017.00126 |
Abstract (2820) HTML (54) PDF (671KB)(8076) Knowledge map |
Suggestions on cyber security talents cultivation |
Hui LI,Ning ZHANG |
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 18-23 doi: 10.11959/j.issn.2096-109x.2015.00003 |
Abstract (2227) HTML (63) PDF (357KB)(7749) Knowledge map |
Malware classification method based on static multiple-feature fusion |
Bo-wen SUN,Yan-yi HUANG,Qiao-kun WEN,Bin TIAN,Peng WU,Qi LI |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (11): 68-76 doi: 10.11959/j.issn.2096-109x.2017.00217 |
Abstract (1719) HTML (85) PDF (529KB)(7668) Knowledge map |
Analysis of cyberspace security based on game theory |
Jian-ming ZHU,Qin WANG |
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 43-49 doi: 10.11959/j.issn.2096-109x.2015.00006 |
Abstract (2197) HTML (73) PDF (764KB)(7167) Knowledge map |
Overview of searchable encryption research |
Ying LI, Chunguang MA |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (7): 13-21 doi: 10.11959/j.issn.2096-109x.2018062 |
Abstract (2126) HTML (123) PDF (592KB)(7089) Knowledge map |
Survey of federated learning research |
Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE |
Chinese Journal of Network and Information Security. 2021 Vol. 7 (5): 77-92 doi: 10.11959/j.issn.2096-109x.2021056 |
Abstract (5590) HTML (878) PDF (787KB)(6844) Knowledge map |
Survey of block chain |
Xin SHEN,Qing-qi PEI,Xue-feng LIU |
Chinese Journal of Network and Information Security.
2016 Vol. 2 (11): 11-20 doi: 10.11959/j.issn.2096-109x.2016.00107 |
Abstract( 20816 ) HTML PDF (461KB) (28293) Knowledge map |
Blockchain-based digital copyright trading system |
Li LI,Siqin ZHOU,Qin LIU,Debiao HE |
Chinese Journal of Network and Information Security.
2018 Vol. 4 (7): 22-29 doi: 10.11959/j.issn.2096-109x.2018060 |
Abstract( 8851 ) HTML PDF (771KB) (4116) Knowledge map |
Relation extraction based on CNN and Bi-LSTM |
Xiaobin ZHANG, Fucai CHEN, Ruiyang HUANG |
Chinese Journal of Network and Information Security.
2018 Vol. 4 (9): 44-51 doi: 10.11959/j.issn.2096-109x.2018074 |
Abstract( 8780 ) HTML PDF (618KB) (4270) Knowledge map |
Supply chain dynamic multi-center coordination authentication model based on block chain |
Jian-ming ZHU,Yong-gui FU |
Chinese Journal of Network and Information Security.
2016 Vol. 2 (1): 27-33 doi: 10.11959/j.issn.2096-109x.2016.00019 |
Abstract( 6243 ) HTML PDF (1052KB) (11300) Knowledge map |
Chinese Journal of Network and Information Security.
2017 Vol. 3 (3): 71-77 doi: 10.11959/j.issn.2096-109x.2017.00157 |
Abstract( 6100 ) HTML PDF (169KB) (62383) Knowledge map |