- Optimization for GPU-based Elliptic Curve Library and Related Algorithms
- GAO Yuyang, ZHANG Jianning, WANG Gang, SU Ming, LIU Xiaoguang
- 2024 9(6):1-16[Abstract](1385)[PDF](598)
- Few-Shot Log Anomaly Detection via Large Language Models
- YUAN Ziyi, ZHANG Haoxing, ZHANG Yuanyuan, WU Gaofei, ZHANG Yuqing
- 2024 9(6):17-27[Abstract](1551)[PDF](764)
- Malware Homology Analysis under Diverse Compilation Environments
- LIU Xinyi, PENG Guojun, LIU Side, YANG Xiuzhang, FU Jianming
- 2024 9(6):28-42[Abstract](944)[PDF](546)
- Differential Privacy Scheme for Digital Microfluidic Biochips
- CHEN Xiao, DONG Chen
- 2024 9(6):43-59[Abstract](923)[PDF](534)
- Generating Adversarial Malware Examples Based on Saliency Analysis
- ZHAN Dazhi, SUN Yi, ZHANG Lei, LIU Xin, GUO Shize, PAN Zhisong
- 2024 9(6):60-73[Abstract](1074)[PDF](536)
- A Survey of Cyber Threat Intelligence Entity Recognition Research
- WANG Xuren, WEI Xinxin, WANG Yuanyuan, JIANG Zhengwei, JIANG Jun, YANG Peian, LIU Runshi
- 2024 9(6):74-99[Abstract](1455)[PDF](641)
- Relation Mining and Attention Based Anomaly Detection for Multivariate Time Series
- HU Zhichao, YU Xiangzhan, LIU Likun, ZHANG Yu, YU Haining
- 2024 9(6):100-113[Abstract](1233)[PDF](476)
- Research on PHP Injection Vulnerability Detection Method Based on Intermediate Language
- ZHANG Guodong, LIU Zilong, YAO Tianyu, JIN Zhuo, SUN Donghong, QIN Jiawei
- 2024 9(6):114-128[Abstract](543)[PDF](282)
- A Malicious User Geolocation Method on Tantan App with Distance Transition
- GUO Jiashan, DU Shaoyong, SHI Wenqi, LIU Ruiting, LUO Xiangyang
- 2024 9(6):129-139[Abstract](495)[PDF](293)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2024 Vol.9(6):1-10 [Abstract](18806) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2024 Vol.9(6):37-51 [Abstract](14059) [[PDF](1.64 M)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2024 Vol.9(6):87-104 [Abstract](14578) [[PDF](1.06 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2024 Vol.9(6):1-9 [Abstract](17563) [[PDF](394.10 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2024 Vol.9(6):21-36 [Abstract](15580) [[PDF](1.16 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2024 Vol.9(6):1-15 [Abstract](14003) [[PDF](935.57 K)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2024 Vol.9(6):10-20 [Abstract](14811) [[PDF](7.66 M)
|