- Research on High-Speed Generation Method of Physical Layer Key Based on Dual Carrier
- JIANG Yu, WANG Yuchun, HU Aiqun
- 2025 10(4):1-19[Abstract](33)[PDF](18)
- A Review of Research on Smart Home Rule Interaction Vulnerability Detection
- WANG Jingyao, CHEN Zemao, WANG Tingting
- 2025 10(4):20-39[Abstract](27)[PDF](12)
- SDLDP: A Local Differential Private Framework for Multi-level Sensitive Data
- CHEN Yaqing, YE Yutong, ZHANG Min, SHU Bowen
- 2025 10(4):40-53[Abstract](47)[PDF](12)
- A Method for Calculating Behavioral Risk in Network Systems Based on Lie Group
- XIAO Yuming, ZHAO Xiaolin, LIU Zhenyan, SONG Ce, CHANG Yue
- 2025 10(4):54-65[Abstract](35)[PDF](14)
- Network Intrusion Detection with Deep Neural Network for Supervised Learning of Discrete Hash
- XUE Yin, WEI Songjie
- 2025 10(4):66-76[Abstract](46)[PDF](11)
- Extended Mirror Theory and Its Applications in Message Authentication Codes
- ZHANG Ping, QIN Jiaqi
- 2025 10(4):77-90[Abstract](21)[PDF](15)
- Robust Image Perturbation Based on Multi-Forgery Model Adversarial Optimization
- MU Wenpeng, WANG Jinwei, CHEN Beijin, NIE Lina, MO Haolan, XU Fei
- 2025 10(4):91-103[Abstract](34)[PDF](14)
- Research on Verification Method of Processor Prediction Vulnerabilities Based on Model Checking
- YE Qingyu, KE Qian, WANG Haixia, QIU Pengfei, LIU Chang, WANG Dongsheng
- 2025 10(4):104-119[Abstract](14)[PDF](8)
- Human-Cyber-Physical Collaborative Countermeasure Models for Critical Infrastructure Security
- ZHU Peidong, KANG Wenjie, LIU Liang, ZHANG Rui, XUN Peng
- 2025 10(4):120-137[Abstract](12)[PDF](7)
See more articles>>
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2025 Vol.10(4):1-9 [Abstract](21438) [[PDF](394.10 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2025 Vol.10(4):37-51 [Abstract](17176) [[PDF](1.64 M)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2025 Vol.10(4):1-10 [Abstract](22246) [[PDF](479.57 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2025 Vol.10(4):87-104 [Abstract](18969) [[PDF](1.06 M)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2025 Vol.10(4):21-36 [Abstract](18889) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2025 Vol.10(4):10-20 [Abstract](18083) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2025 Vol.10(4):1-15 [Abstract](17740) [[PDF](935.57 K)
|