- Automatic Data Generation of DNS-Based Exfiltration for AI-Model Training
- FENG Lin, CUI Xiang, WANG Zhongru, GAN Ruiling, DIAO Jiawen, HAN Dongxu and JIANG Hai
- 2021 6(1):1-16[Abstract](226)[PDF](253)
- DDoS detection and mitigation Framework in SDN
- JIA Kun, WANG Junnan and LIU Feng
- 2021 6(1):17-31[Abstract](151)[PDF](119)
- Research on MOOC Cheating Detection Based on Deep Learning
- WAN Ziyun, CHEN Shiwei, QIN Bin, NIE Wei and XU Ming
- 2021 6(1):32-39[Abstract](168)[PDF](136)
- Powershell malware detection method based on features combination
- LIU Yue, LIU Baoxu, ZHAO Zihao, LIU Chaoge, WANG Xiaoxi and WU Xianda
- 2021 6(1):40-53[Abstract](161)[PDF](119)
- Cross domain authentication and key agreement protocol based on blockchain in edge computing environment
- ZHANG Jinhua, LI Xiaowei, ZENG Xin, ZHAO Yuqin, DUAN Ran and YANG Dengqi
- 2021 6(1):54-61[Abstract](127)[PDF](109)
- Cybersecurity Talents Intelligent Evaluation Based on Bayesian Knowledge Tracing Model
- ZHANG Fangjiao, ZHAO Jianjun, LIU Xinyu, WANG Xiaolei, LIU Qixu and CUI Xiang
- 2021 6(1):62-77[Abstract](155)[PDF](268)
- Secure computing outsourcing scheme for polynomial with privacy protection based on blockchain
- GUO Zhen, ZHANG Yin, AN Fanglin, ZHAO Kejie, ZHANG Wenjie and YE Jun
- 2021 6(1):78-89[Abstract](141)[PDF](157)
See more articles>>
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2021 Vol.6(1):37-51 [Abstract](3905) [[PDF](1.64 M)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2021 Vol.6(1):1-10 [Abstract](5112) [[PDF](479.57 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2021 Vol.6(1):87-104 [Abstract](3416) [[PDF](1.06 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2021 Vol.6(1):1-9 [Abstract](4930) [[PDF](394.10 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2021 Vol.6(1):21-36 [Abstract](3843) [[PDF](1.16 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2021 Vol.6(1):1-15 [Abstract](3719) [[PDF](935.57 K)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2021 Vol.6(1):10-20 [Abstract](4206) [[PDF](7.66 M)
|