- Optimization for GPU-based Elliptic Curve Library and Related Algorithms
- GAO Yuyang, ZHANG Jianning, WANG Gang, SU Ming, LIU Xiaoguang
- 2024 9(6):1-16[Abstract](1911)[PDF](964)
- Few-Shot Log Anomaly Detection via Large Language Models
- YUAN Ziyi, ZHANG Haoxing, ZHANG Yuanyuan, WU Gaofei, ZHANG Yuqing
- 2024 9(6):17-27[Abstract](2505)[PDF](1276)
- Malware Homology Analysis under Diverse Compilation Environments
- LIU Xinyi, PENG Guojun, LIU Side, YANG Xiuzhang, FU Jianming
- 2024 9(6):28-42[Abstract](1321)[PDF](823)
- Differential Privacy Scheme for Digital Microfluidic Biochips
- CHEN Xiao, DONG Chen
- 2024 9(6):43-59[Abstract](1201)[PDF](780)
- Generating Adversarial Malware Examples Based on Saliency Analysis
- ZHAN Dazhi, SUN Yi, ZHANG Lei, LIU Xin, GUO Shize, PAN Zhisong
- 2024 9(6):60-73[Abstract](1517)[PDF](800)
- A Survey of Cyber Threat Intelligence Entity Recognition Research
- WANG Xuren, WEI Xinxin, WANG Yuanyuan, JIANG Zhengwei, JIANG Jun, YANG Peian, LIU Runshi
- 2024 9(6):74-99[Abstract](2178)[PDF](930)
- Relation Mining and Attention Based Anomaly Detection for Multivariate Time Series
- HU Zhichao, YU Xiangzhan, LIU Likun, ZHANG Yu, YU Haining
- 2024 9(6):100-113[Abstract](1721)[PDF](736)
- Research on PHP Injection Vulnerability Detection Method Based on Intermediate Language
- ZHANG Guodong, LIU Zilong, YAO Tianyu, JIN Zhuo, SUN Donghong, QIN Jiawei
- 2024 9(6):114-128[Abstract](876)[PDF](528)
- A Malicious User Geolocation Method on Tantan App with Distance Transition
- GUO Jiashan, DU Shaoyong, SHI Wenqi, LIU Ruiting, LUO Xiangyang
- 2024 9(6):129-139[Abstract](769)[PDF](497)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2024 Vol.9(6):1-10 [Abstract](19211) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2024 Vol.9(6):37-51 [Abstract](14359) [[PDF](1.64 M)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2024 Vol.9(6):87-104 [Abstract](14827) [[PDF](1.06 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2024 Vol.9(6):1-9 [Abstract](18119) [[PDF](394.10 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2024 Vol.9(6):21-36 [Abstract](15926) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2024 Vol.9(6):10-20 [Abstract](15123) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2024 Vol.9(6):1-15 [Abstract](14274) [[PDF](935.57 K)
|