- Research on Privacy Protection Technology of IoV
- LI Ruiqin, HU Xiaoya, ZHANG Juyuan, WANG Licheng
- 2024 9(2):1-18[Abstract](3648)[PDF](2082)
- Knowledge Acquisition and Decision Making in Incomplete Rumor Information System based on Rough Set
- WANG Biao, WEI Hongquan, WANG Kai, LIU Shuxin, JIANG Haocong
- 2024 9(2):19-35[Abstract](3230)[PDF](2107)
- Interactive-Gaming Guided Modeling and Detection for Network Traffic Anomaly Detection
- ZHANG Wenzhe, YANG Dong, WEI Songjie
- 2024 9(2):36-46[Abstract](3207)[PDF](1932)
- CON-MVX: A Multi-Variant Execution System Based on Container Technology
- LIU Zijing, ZHANG Zheng, XI Ruicheng, ZHU Pengzhe, WU Jiangxing
- 2024 9(2):47-58[Abstract](3068)[PDF](1924)
- Initialization and Mutation Mechanism in Genetic-Algorithm-Based Power Analysis
- XU Yijun, LI Yuan, TANG Minghuan, DING Yaoling, WANG An
- 2024 9(2):59-68[Abstract](3049)[PDF](1945)
- Efficient Speech Biological Hashing Secure Retrieval Algorithm Based on Double Hash Index
- HUANG Yibo, CHEN Dehuai, ZHANG Qiuyu
- 2024 9(2):69-83[Abstract](3095)[PDF](1821)
- SM2-based Identity-based Authentication Key Exchange Protocol
- WANG Xiaohu, LIN Chao, WU Wei
- 2024 9(2):84-95[Abstract](3115)[PDF](1776)
- Study on Tweakable Enciphering Schemes Against Simon’s Quantum Algorithm
- MAO Shuping, WANG Peng, HU Lei
- 2024 9(2):96-105[Abstract](315)[PDF](215)
- An Efficient and Verifiable Secure Truth Discovery in Mobile Crowdsensing
- WANG Taochun, ZHANG Chenlu, CAI Songjian, CHEN Fulong, SHEN Huimin, XIE Dong
- 2024 9(2):106-121[Abstract](302)[PDF](227)
See more articles>>
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2024 Vol.9(2):1-9 [Abstract](12678) [[PDF](394.10 K)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2024 Vol.9(2):1-10 [Abstract](13612) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2024 Vol.9(2):37-51 [Abstract](10500) [[PDF](1.64 M)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2024 Vol.9(2):87-104 [Abstract](11000) [[PDF](1.06 M)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2024 Vol.9(2):21-36 [Abstract](11377) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2024 Vol.9(2):10-20 [Abstract](11013) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2024 Vol.9(2):1-15 [Abstract](10434) [[PDF](935.57 K)
|