- A Research on Attack-path Prediction Method for APT Organization
- CHEN Weixiang, REN Yitong, XIAO Yanjun, HOU Rui, TIAN Zhihong
- 2023 8(1):1-13[Abstract](548)[PDF](224)
- KMBox: Linux Kernel-based Heterogeneous Redundant Execution System Designed for Processes
- MA Bolin, ZHANG Zheng, SHAO Yuwen, LI Bingzheng, PAN Chuanxing, JIANG Peng, WU Jiangxing
- 2023 8(1):14-25[Abstract](296)[PDF](106)
- Robust Enhancement Method of Depth Model Based on Texture Feature Constraint
- YANG Zhongguo, ZHANG Juan, WANG Lijun
- 2023 8(1):26-39[Abstract](252)[PDF](106)
- Research on Medical Data Access Control and Security Sharing in Public Health Events
- HAN Gang, WANG Jiaqian, LUO wei, LV Yingze
- 2023 8(1):40-54[Abstract](252)[PDF](124)
- Zero-knowledge Authentication and Management Architecture of Verifiable Certificate of Digital Identity Based on Smart Contracts of Blockchain
- SONG Zhiming, YU Yimin, WANG Guiwen, CHEN Taowei
- 2023 8(1):55-77[Abstract](317)[PDF](155)
- Feedback-driven Fuzzing Technology Based on Partial Simulation of IoT Devices
- LU Haoliang, ZOU Yanyan, PENG Yue, TAN Lingxiao, ZHANG Yu, LIU Longquan, HUO Wei
- 2023 8(1):78-92[Abstract](272)[PDF](126)
- Medical Information Attribute Encryption Access Control Scheme Based on Blockchain
- ZHENG Lijuan, LIU Jiaqi, TAO Yanan, ZHANG Rui, ZHANG Yu, WU Penggang, YOU Junkao
- 2023 8(1):93-107[Abstract](290)[PDF](127)
- A Public-key Encryption with Keyword Search Scheme from SM9
- PU Lang, LIN Chao, WU Wei, HE Debiao
- 2023 (1):108-118[Abstract](193)[PDF](95)
- Defense Against Physical Attacks on Object Detection Based on Entropy and Random Erasing
- GAO Hongchao, ZHOU Guangzhi, DAI Jiao, LI Zhaoxing, HAN Jizhong
- 2023 8(1):119-130[Abstract](144)[PDF](91)
See more articles>>
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2023 Vol.8(1):1-9 [Abstract](9067) [[PDF](394.10 K)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2023 Vol.8(1):1-10 [Abstract](9649) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2023 Vol.8(1):37-51 [Abstract](7896) [[PDF](1.64 M)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2023 Vol.8(1):87-104 [Abstract](8069) [[PDF](1.06 M)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2023 Vol.8(1):21-36 [Abstract](7798) [[PDF](1.16 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2023 Vol.8(1):1-15 [Abstract](7837) [[PDF](935.57 K)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2023 Vol.8(1):10-20 [Abstract](8485) [[PDF](7.66 M)
|