- Blockchain Fraud Behaviors Detection Technology: A Survey
- LI Guang, CHEN Zitian, BIAN Jing, ZHOU Jieying, WU Weigang
- 2024 9(4):1-30[Abstract](9329)[PDF](5880)
- Research on Internal Keyword Guessing Attack in Public Key Searchable Encryption
- WEI Zhongkai, ZHANG Xi, LIU Jinlu, QIN Jing
- 2024 9(4):31-46[Abstract](8760)[PDF](5702)
- A Survey on Defense against Deep Neural Network Backdoor Attack
- JIANG Qinhui, LI Mohan, SUN Yanbin
- 2024 9(4):47-63[Abstract](9797)[PDF](6228)
- Practical Dynamic Binary Analysis Framework via Integrating Hypervisor with the Operating System
- PAN Jiaye, SHA Letian
- 2024 9(4):64-78[Abstract](8615)[PDF](5354)
- Shortest Path Queries on Structured Encrypted Graph
- PAN Yingying, CHEN Lanxiang
- 2024 9(4):79-94[Abstract](8330)[PDF](5274)
- Research on Active Network Topology Perception and Analysis for Ethereum
- BAI Xiaodong, LIU Daidong, WEI Songjie
- 2024 9(4):95-106[Abstract](8484)[PDF](5198)
- Evaluations of Cache Side Channels Attacks and Defends
- WANG Zhanpeng, ZHU Ziyuan, WANG Limin
- 2024 9(4):107-124[Abstract](8627)[PDF](5165)
- The Passive Forensics of Deep Video Inpainting
- XIONG Yimao, DING Xiangling, GU Qing, YANG Gaobo, ZHAO Xianfeng
- 2024 9(4):125-138[Abstract](912)[PDF](744)
- A HEVC Information Hiding Algorithm Based on Motion Vector Modification Minimizing the Distortion between Blocks
- TANG Xiaojing, MA Yi, YU Jianchang, ZHANG Hong, ZHAO Xianfeng
- 2024 9(4):139-149[Abstract](884)[PDF](639)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2024 Vol.9(4):1-10 [Abstract](16631) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2024 Vol.9(4):37-51 [Abstract](12605) [[PDF](1.64 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2024 Vol.9(4):1-9 [Abstract](15123) [[PDF](394.10 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2024 Vol.9(4):87-104 [Abstract](12980) [[PDF](1.06 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2024 Vol.9(4):1-15 [Abstract](12633) [[PDF](935.57 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2024 Vol.9(4):21-36 [Abstract](13666) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2024 Vol.9(4):10-20 [Abstract](13021) [[PDF](7.66 M)
|