2024 Vol.10 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
---|---|---|---|---|---|---|
2023 Vol.9 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2022 Vol.8 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2021 Vol.7 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2020 Vol.6 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2019 Vol.5 | No.6 | No.5 | No.4 | No.3 | No.2 | No.1 |
2018 Vol.4 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2017 Vol.3 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2016 Vol.2 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
2015 Vol.1 | No.1 |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (3): 71-77 doi: 10.11959/j.issn.2096-109x.2017.00157 |
Abstract (6207) HTML (96) PDF (169KB)(63049) Knowledge map |
Survey of block chain |
Xin SHEN,Qing-qi PEI,Xue-feng LIU |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (11): 11-20 doi: 10.11959/j.issn.2096-109x.2016.00107 |
Abstract (22030) HTML (3069) PDF (461KB)(29956) Knowledge map |
Study on BGP route leak |
Jia JIA,Zhi-wei YAN,Guang-gang GENG,Jian JIN |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (8): 54-61 doi: 10.11959/j.issn.2096-109x.2016.00074 |
Abstract (3506) HTML (158) PDF (472KB)(21467) Knowledge map |
Research on host malcode detection using machine learning |
Dong ZHANG,Yao ZHANG,Gang LIU,Gui-xiang SONG |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 25-32 doi: 10.11959/j.issn.2096-109x.2017.00179 |
Abstract (3012) HTML (155) PDF (648KB)(13000) Knowledge map |
Supply chain dynamic multi-center coordination authentication model based on block chain |
Jian-ming ZHU,Yong-gui FU |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 27-33 doi: 10.11959/j.issn.2096-109x.2016.00019 |
Abstract (6380) HTML (157) PDF (1052KB)(11961) Knowledge map |
Define cyberspace security |
Binxing FANG |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2018002 |
Abstract (5376) HTML (388) PDF (456KB)(11752) Knowledge map |
Review of key technology and its application of blockchain |
Feng ZHANG, Boxuan SHI, Wenbao JIANG |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (4): 22-29 doi: 10.11959/j.issn.2096-109x.2018028 |
Abstract (5960) HTML (682) PDF (690KB)(11510) Knowledge map |
Machine learning security and privacy:a survey |
Lei SONG, Chunguang MA, Guanghan DUAN |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (8): 1-11 doi: 10.11959/j.issn.2096-109x.2018067 |
Abstract (6364) HTML (316) PDF (701KB)(10706) Knowledge map |
Research progress and trend of text summarization |
Tuosiyu MING, Hongchang CHEN |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (6): 1-10 doi: 10.11959/j.issn.2096-109x.2018048 |
Abstract (5833) HTML (103) PDF (568KB)(10663) Knowledge map |
Analysis and enlightenment on the cybersecurity strategy of various countries in the world |
Yu-xiao LI,Yong-jiang XIE |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2016.00017 |
Abstract (2595) HTML (210) PDF (374KB)(10463) Knowledge map |
Survey of federated learning research |
Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE |
Chinese Journal of Network and Information Security. 2021 Vol. 7 (5): 77-92 doi: 10.11959/j.issn.2096-109x.2021056 |
Abstract (7339) HTML (1331) PDF (787KB)(9743) Knowledge map |
Research of phishing detection technology |
Xi ZHANG,Zhi-wei YAN,Hong-tao LI,Guang-gang GENG |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 7-24 doi: 10.11959/j.issn.2096-109x.2017.00180 |
Abstract (2674) HTML (149) PDF (870KB)(9365) Knowledge map |
Overview of searchable encryption research |
Ying LI, Chunguang MA |
Chinese Journal of Network and Information Security. 2018 Vol. 4 (7): 13-21 doi: 10.11959/j.issn.2096-109x.2018062 |
Abstract (2386) HTML (161) PDF (592KB)(9110) Knowledge map |
Data security and protection techniques in big data:a survey |
Kai-min WEI,Jian WENG,Kui REN |
Chinese Journal of Network and Information Security. 2016 Vol. 2 (4): 1-11 doi: 10.11959/j.issn.2096-109x.2016.00046 |
Abstract (4282) HTML (149) PDF (1446KB)(8852) Knowledge map |
Symbolic execution based control flow graph extraction method for Android native codes |
Hui-ying YAN,Zhen-ji ZHOU,Li-fa WU,Zheng HONG,He SUN |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 33-46 doi: 10.11959/j.issn.2096-109x.2017.00178 |
Abstract (1796) HTML (15) PDF (619KB)(8670) Knowledge map |
Survey of DDoS defense:challenges and directions |
Fei CHEN,Xiao-hong BI,Jing-jing WANG,Yuan LIU |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (10): 16-24 doi: 10.11959/j.issn.2096-109x.2017.00202 |
Abstract (2828) HTML (118) PDF (555KB)(8564) Knowledge map |
Malware classification method based on static multiple-feature fusion |
Bo-wen SUN,Yan-yi HUANG,Qiao-kun WEN,Bin TIAN,Peng WU,Qi LI |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (11): 68-76 doi: 10.11959/j.issn.2096-109x.2017.00217 |
Abstract (1871) HTML (95) PDF (529KB)(8564) Knowledge map |
Machine learning algorithm for intelligent detection of WebShell |
Hua DAI,Jing LI,Xin-dai LU,Xin SUN |
Chinese Journal of Network and Information Security. 2017 Vol. 3 (4): 51-57 doi: 10.11959/j.issn.2096-109x.2017.00126 |
Abstract (2946) HTML (61) PDF (671KB)(8515) Knowledge map |
Suggestions on cyber security talents cultivation |
Hui LI,Ning ZHANG |
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 18-23 doi: 10.11959/j.issn.2096-109x.2015.00003 |
Abstract (2344) HTML (68) PDF (357KB)(8206) Knowledge map |
Analysis of cyberspace security based on game theory |
Jian-ming ZHU,Qin WANG |
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 43-49 doi: 10.11959/j.issn.2096-109x.2015.00006 |
Abstract (2398) HTML (84) PDF (764KB)(7909) Knowledge map |
Survey of block chain |
Xin SHEN,Qing-qi PEI,Xue-feng LIU |
Chinese Journal of Network and Information Security.
2016 Vol. 2 (11): 11-20 doi: 10.11959/j.issn.2096-109x.2016.00107 |
Abstract( 22030 ) HTML PDF (461KB) (29956) Knowledge map |
Blockchain-based digital copyright trading system |
Li LI,Siqin ZHOU,Qin LIU,Debiao HE |
Chinese Journal of Network and Information Security.
2018 Vol. 4 (7): 22-29 doi: 10.11959/j.issn.2096-109x.2018060 |
Abstract( 8999 ) HTML PDF (771KB) (4619) Knowledge map |
Relation extraction based on CNN and Bi-LSTM |
Xiaobin ZHANG, Fucai CHEN, Ruiyang HUANG |
Chinese Journal of Network and Information Security.
2018 Vol. 4 (9): 44-51 doi: 10.11959/j.issn.2096-109x.2018074 |
Abstract( 8943 ) HTML PDF (618KB) (4682) Knowledge map |
Survey of federated learning research |
Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE |
Chinese Journal of Network and Information Security.
2021 Vol. 7 (5): 77-92 doi: 10.11959/j.issn.2096-109x.2021056 |
Abstract( 7339 ) HTML PDF (787KB) (9743) Knowledge map |
Supply chain dynamic multi-center coordination authentication model based on block chain |
Jian-ming ZHU,Yong-gui FU |
Chinese Journal of Network and Information Security.
2016 Vol. 2 (1): 27-33 doi: 10.11959/j.issn.2096-109x.2016.00019 |
Abstract( 6380 ) HTML PDF (1052KB) (11961) Knowledge map |