2023 Vol.9 | No.4 | No.3 | No.2 | No.1 | ||
---|---|---|---|---|---|---|
2022 Vol.8 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2021 Vol.7 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2020 Vol.6 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2019 Vol.5 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2018 Vol.4 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2017 Vol.3 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2016 Vol.2 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2015 Vol.1 | No.1 |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (3): 71-77 doi: 10.11959/j.issn.2096-109x.2017.00157 |
![]() ![]() ![]() ![]() |
Survey of block chain |
Xin SHEN,Qing-qi PEI,Xue-feng LIU |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (11): 11-20 doi: 10.11959/j.issn.2096-109x.2016.00107 |
![]() ![]() ![]() ![]() |
Study on BGP route leak |
Jia JIA,Zhi-wei YAN,Guang-gang GENG,Jian JIN |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (8): 54-61 doi: 10.11959/j.issn.2096-109x.2016.00074 |
![]() ![]() ![]() ![]() |
Research on host malcode detection using machine learning |
Dong ZHANG,Yao ZHANG,Gang LIU,Gui-xiang SONG |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 25-32 doi: 10.11959/j.issn.2096-109x.2017.00179 |
![]() ![]() ![]() ![]() |
Supply chain dynamic multi-center coordination authentication model based on block chain |
Jian-ming ZHU,Yong-gui FU |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 27-33 doi: 10.11959/j.issn.2096-109x.2016.00019 |
![]() ![]() ![]() ![]() |
Define cyberspace security |
Binxing FANG |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2018002 |
![]() ![]() ![]() ![]() |
Research progress and trend of text summarization |
Tuosiyu MING, Hongchang CHEN |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (6): 1-10 doi: 10.11959/j.issn.2096-109x.2018048 |
![]() ![]() ![]() ![]() |
Review of key technology and its application of blockchain |
Feng ZHANG, Boxuan SHI, Wenbao JIANG |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (4): 22-29 doi: 10.11959/j.issn.2096-109x.2018028 |
![]() ![]() ![]() ![]() |
Machine learning security and privacy:a survey |
Lei SONG, Chunguang MA, Guanghan DUAN |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (8): 1-11 doi: 10.11959/j.issn.2096-109x.2018067 |
![]() ![]() ![]() ![]() |
Analysis and enlightenment on the cybersecurity strategy of various countries in the world |
Yu-xiao LI,Yong-jiang XIE |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2016.00017 |
![]() ![]() ![]() ![]() |
Research of phishing detection technology |
Xi ZHANG,Zhi-wei YAN,Hong-tao LI,Guang-gang GENG |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 7-24 doi: 10.11959/j.issn.2096-109x.2017.00180 |
![]() ![]() ![]() ![]() |
Survey of DDoS defense:challenges and directions |
Fei CHEN,Xiao-hong BI,Jing-jing WANG,Yuan LIU |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (10): 16-24 doi: 10.11959/j.issn.2096-109x.2017.00202 |
![]() ![]() ![]() ![]() |
Symbolic execution based control flow graph extraction method for Android native codes |
Hui-ying YAN,Zhen-ji ZHOU,Li-fa WU,Zheng HONG,He SUN |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 33-46 doi: 10.11959/j.issn.2096-109x.2017.00178 |
![]() ![]() ![]() ![]() |
Machine learning algorithm for intelligent detection of WebShell |
Hua DAI,Jing LI,Xin-dai LU,Xin SUN |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (4): 51-57 doi: 10.11959/j.issn.2096-109x.2017.00126 |
![]() ![]() ![]() ![]() |
Data security and protection techniques in big data:a survey |
Kai-min WEI,Jian WENG,Kui REN |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (4): 1-11 doi: 10.11959/j.issn.2096-109x.2016.00046 |
![]() ![]() ![]() ![]() |
Suggestions on cyber security talents cultivation |
Hui LI,Ning ZHANG |
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 18-23 doi: 10.11959/j.issn.2096-109x.2015.00003 |
![]() ![]() ![]() ![]() |
Malware classification method based on static multiple-feature fusion |
Bo-wen SUN,Yan-yi HUANG,Qiao-kun WEN,Bin TIAN,Peng WU,Qi LI |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (11): 68-76 doi: 10.11959/j.issn.2096-109x.2017.00217 |
![]() ![]() ![]() ![]() |
Analysis of cyberspace security based on game theory |
Jian-ming ZHU,Qin WANG |
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 43-49 doi: 10.11959/j.issn.2096-109x.2015.00006 |
![]() ![]() ![]() ![]() |
Progress of research on privacy protection for data publication and data mining |
Jiao WANG,Ke-feng FAN,Yong WANG |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 18-26 doi: 10.11959/j.issn.2096-109x.2016.00021 |
![]() ![]() ![]() ![]() |
Overview of searchable encryption research |
Ying LI, Chunguang MA |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (7): 13-21 doi: 10.11959/j.issn.2096-109x.2018062 |
![]() ![]() ![]() ![]() |
Survey of block chain |
Xin SHEN,Qing-qi PEI,Xue-feng LIU |
Chinese Journal of Network and Information Security.
2016 Vol. 2 (11): 11-20 doi: 10.11959/j.issn.2096-109x.2016.00107 |
![]() ![]() ![]() ![]() |
Blockchain-based digital copyright trading system |
Li LI,Siqin ZHOU,Qin LIU,Debiao HE |
Chinese Journal of Network and Information Security.
2018 Vol. 4 (7): 22-29 doi: 10.11959/j.issn.2096-109x.2018060 |
![]() ![]() ![]() ![]() |
Relation extraction based on CNN and Bi-LSTM |
Xiaobin ZHANG, Fucai CHEN, Ruiyang HUANG |
Chinese Journal of Network and Information Security.
2018 Vol. 4 (9): 44-51 doi: 10.11959/j.issn.2096-109x.2018074 |
![]() ![]() ![]() ![]() |
Supply chain dynamic multi-center coordination authentication model based on block chain |
Jian-ming ZHU,Yong-gui FU |
Chinese Journal of Network and Information Security.
2016 Vol. 2 (1): 27-33 doi: 10.11959/j.issn.2096-109x.2016.00019 |
![]() ![]() ![]() ![]() |
Chinese Journal of Network and Information Security.
2017 Vol. 3 (3): 71-77 doi: 10.11959/j.issn.2096-109x.2017.00157 |
![]() ![]() ![]() ![]() |