- Optimization for GPU-based Elliptic Curve Library and Related Algorithms
- GAO Yuyang, ZHANG Jianning, WANG Gang, SU Ming, LIU Xiaoguang
- 2024 9(6):1-16[Abstract](748)[PDF](374)
- Few-Shot Log Anomaly Detection via Large Language Models
- YUAN Ziyi, ZHANG Haoxing, ZHANG Yuanyuan, WU Gaofei, ZHANG Yuqing
- 2024 9(6):17-27[Abstract](817)[PDF](444)
- Malware Homology Analysis under Diverse Compilation Environments
- LIU Xinyi, PENG Guojun, LIU Side, YANG Xiuzhang, FU Jianming
- 2024 9(6):28-42[Abstract](597)[PDF](377)
- Differential Privacy Scheme for Digital Microfluidic Biochips
- CHEN Xiao, DONG Chen
- 2024 9(6):43-59[Abstract](572)[PDF](362)
- Generating Adversarial Malware Examples Based on Saliency Analysis
- ZHAN Dazhi, SUN Yi, ZHANG Lei, LIU Xin, GUO Shize, PAN Zhisong
- 2024 9(6):60-73[Abstract](665)[PDF](346)
- A Survey of Cyber Threat Intelligence Entity Recognition Research
- WANG Xuren, WEI Xinxin, WANG Yuanyuan, JIANG Zhengwei, JIANG Jun, YANG Peian, LIU Runshi
- 2024 9(6):74-99[Abstract](889)[PDF](422)
- Relation Mining and Attention Based Anomaly Detection for Multivariate Time Series
- HU Zhichao, YU Xiangzhan, LIU Likun, ZHANG Yu, YU Haining
- 2024 9(6):100-113[Abstract](750)[PDF](327)
- Research on PHP Injection Vulnerability Detection Method Based on Intermediate Language
- ZHANG Guodong, LIU Zilong, YAO Tianyu, JIN Zhuo, SUN Donghong, QIN Jiawei
- 2024 9(6):114-128[Abstract](247)[PDF](133)
- A Malicious User Geolocation Method on Tantan App with Distance Transition
- GUO Jiashan, DU Shaoyong, SHI Wenqi, LIU Ruiting, LUO Xiangyang
- 2024 9(6):129-139[Abstract](236)[PDF](146)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2024 Vol.9(6):1-10 [Abstract](18351) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2024 Vol.9(6):37-51 [Abstract](13785) [[PDF](1.64 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2024 Vol.9(6):1-9 [Abstract](17141) [[PDF](394.10 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2024 Vol.9(6):87-104 [Abstract](14322) [[PDF](1.06 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2024 Vol.9(6):1-15 [Abstract](13762) [[PDF](935.57 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2024 Vol.9(6):21-36 [Abstract](15267) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2024 Vol.9(6):10-20 [Abstract](14536) [[PDF](7.66 M)
|