[1] |
Heli WANG, Qiao YAN.
Selfish mining detection scheme based on the characters of transactions
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114.
|
[2] |
Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU.
Network security of the National Natural Science Foundation of China: today and prospects
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101.
|
[3] |
Fukang XING, Zheng ZHANG, Ran SUI, Sheng QU, Xinsheng JI.
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 121-128.
|
[4] |
Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI.
Design and analysis of intelligent service chain system for network security resource pool
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 175-181.
|
[5] |
Xinya WANG, Guang HUA, Hao JIANG, Haijian ZHANG.
Survey on intellectual property protection for deep learning model
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 1-14.
|
[6] |
Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU.
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 15-38.
|
[7] |
Yang WANG, Guangming TANG, Shuo WANG, Jiang CHU.
Defense mechanism of SDN application layer against DDoS attack based on API call management
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 73-87.
|
[8] |
Guyue LI, Aiqun HU.
Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 183-189.
|
[9] |
Jie QIU, Rui HAN, Zhifeng WEI, Zhiyang WANG.
Research of public infrastructure system and security policy in cyberspace
[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 56-67.
|
[10] |
Tao WANG, Hongchang CHEN.
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
[J]. Chinese Journal of Network and Information Security, 2021, 7(3): 72-84.
|
[11] |
Fu XIAO, Haiping HUANG, Sujun HU, Lijuan SUN.
Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province
[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 1-9.
|
[12] |
Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO.
Research on security scenarios and security models for 6G networking
[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 28-45.
|
[13] |
ZHANG Huanguo,DU Ruiying.
Introduction to cyberspace security discipline
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18.
|
[14] |
XU Tongge,LIU Lianzhong,LIU Jianwei,MAO Jian.
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 19-24.
|
[15] |
HU Aiqun,LI Guyue,PENG Linning,LI Tao.
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 54-66.
|