- Design of Message Authentication Protocol for Vehicle Heterogeneous Network Nodes
- XU Guosheng, LI Yijing, WANG Zihan, WANG Chenyu
- 2026 11(1):1-8[Abstract](812)[PDF](173)
- Single-Parameter Backdoor Attack Based on Model Manipulation
- DUAN Qiuyu, HOU Linshan, HUA Zhongyun, LIAO Qing, ZHANG Yushu, ZHANG Yu
- 2026 11(1):9-21[Abstract](677)[PDF](167)
- Trusted Compilation of Smart Contract Intermediate Language Based on the CompCert Memory Model
- XU Ying, ZHANG Yafeng, XU Jinghang, KANG Yuexin, XIA Qing, YUAN Feng, ZUO Chun, LI Yucheng
- 2026 11(1):22-36[Abstract](650)[PDF](167)
- WebShell Detection Method Based on Dynamic Word Embeddings and Graph Convolution
- ZHAI Jiangtao, WANG Tao, ZHOU Qiao, DONG Yi, WANG Zihao
- 2026 11(1):37-47[Abstract](585)[PDF](146)
- C2BR-VDS: A Black Box Real-time Verification Scheme for Streaming Data for on Chain and off Chain Hybrid Storage
- LIN Wei, SUN Yi, YANG Jiashuo, LI Yujie
- 2026 11(1):48-61[Abstract](624)[PDF](105)
- Fail-Stop Attribute-Based Group Signature Scheme with CCA Anonymity in Standard Model
- LIAO Dongxu, CHENG Xiaogang
- 2026 11(1):62-78[Abstract](548)[PDF](139)
- State-of-the-Art Survey of Network Intrusion Detection Technology based on Deep Learning
- SU Shubin, XIAO Limin, LI Shupan, HUANG Xingwang, XIE Shutong, WU Bo
- 2026 11(1):79-101[Abstract](852)[PDF](165)
- Research on Mechanism of Human-Machine Collaborative Vulnerability Mining
- LIN Zhechao, LU Shuaibing, NIE Yuanping, ZHANG Jia, DUAN Haixin, LI Xiang, KUANG Xiaohui
- 2026 11(1):102-114[Abstract](502)[PDF](117)
- Negative Database Generation Algorithm based on DES Algorithm and Integer Factorization
- ZHAO Dongdong, LIU Zhihui, LIAO Lei, XIANG Jianwen, JIANG Hao
- 2026 11(1):115-135[Abstract](424)[PDF](102)
See more articles>>
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2026 Vol.11(1):37-51 [Abstract](22185) [[PDF](1.64 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2026 Vol.11(1):1-9 [Abstract](27057) [[PDF](394.10 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2026 Vol.11(1):87-104 [Abstract](23683) [[PDF](1.06 M)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2026 Vol.11(1):1-10 [Abstract](27551) [[PDF](479.57 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2026 Vol.11(1):21-36 [Abstract](24199) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2026 Vol.11(1):10-20 [Abstract](23007) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2026 Vol.11(1):1-15 [Abstract](22225) [[PDF](935.57 K)
|