- Blockchain Fraud Behaviors Detection Technology: A Survey
- LI Guang, CHEN Zitian, BIAN Jing, ZHOU Jieying, WU Weigang
- 2024 9(4):1-30[Abstract](10315)[PDF](6488)
- Research on Internal Keyword Guessing Attack in Public Key Searchable Encryption
- WEI Zhongkai, ZHANG Xi, LIU Jinlu, QIN Jing
- 2024 9(4):31-46[Abstract](9632)[PDF](6255)
- A Survey on Defense against Deep Neural Network Backdoor Attack
- JIANG Qinhui, LI Mohan, SUN Yanbin
- 2024 9(4):47-63[Abstract](10861)[PDF](6867)
- Practical Dynamic Binary Analysis Framework via Integrating Hypervisor with the Operating System
- PAN Jiaye, SHA Letian
- 2024 9(4):64-78[Abstract](9442)[PDF](5852)
- Shortest Path Queries on Structured Encrypted Graph
- PAN Yingying, CHEN Lanxiang
- 2024 9(4):79-94[Abstract](9154)[PDF](5791)
- Research on Active Network Topology Perception and Analysis for Ethereum
- BAI Xiaodong, LIU Daidong, WEI Songjie
- 2024 9(4):95-106[Abstract](9333)[PDF](5715)
- Evaluations of Cache Side Channels Attacks and Defends
- WANG Zhanpeng, ZHU Ziyuan, WANG Limin
- 2024 9(4):107-124[Abstract](9517)[PDF](5700)
- The Passive Forensics of Deep Video Inpainting
- XIONG Yimao, DING Xiangling, GU Qing, YANG Gaobo, ZHAO Xianfeng
- 2024 9(4):125-138[Abstract](996)[PDF](784)
- A HEVC Information Hiding Algorithm Based on Motion Vector Modification Minimizing the Distortion between Blocks
- TANG Xiaojing, MA Yi, YU Jianchang, ZHANG Hong, ZHAO Xianfeng
- 2024 9(4):139-149[Abstract](955)[PDF](695)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2024 Vol.9(4):1-10 [Abstract](16851) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2024 Vol.9(4):37-51 [Abstract](12710) [[PDF](1.64 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2024 Vol.9(4):1-9 [Abstract](15397) [[PDF](394.10 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2024 Vol.9(4):87-104 [Abstract](13186) [[PDF](1.06 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2024 Vol.9(4):1-15 [Abstract](12747) [[PDF](935.57 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2024 Vol.9(4):21-36 [Abstract](13851) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2024 Vol.9(4):10-20 [Abstract](13150) [[PDF](7.66 M)
|