- Research on High-Speed Generation Method of Physical Layer Key Based on Dual Carrier
- JIANG Yu, WANG Yuchun, HU Aiqun
- 2025 10(4):1-19[Abstract](650)[PDF](538)
- A Review of Research on Smart Home Rule Interaction Vulnerability Detection
- WANG Jingyao, CHEN Zemao, WANG Tingting
- 2025 10(4):20-39[Abstract](624)[PDF](536)
- SDLDP: A Local Differential Private Framework for Multi-level Sensitive Data
- CHEN Yaqing, YE Yutong, ZHANG Min, SHU Bowen
- 2025 10(4):40-53[Abstract](703)[PDF](513)
- A Method for Calculating Behavioral Risk in Network Systems Based on Lie Group
- XIAO Yuming, ZHAO Xiaolin, LIU Zhenyan, SONG Ce, CHANG Yue
- 2025 10(4):54-65[Abstract](675)[PDF](526)
- Network Intrusion Detection with Deep Neural Network for Supervised Learning of Discrete Hash
- XUE Yin, WEI Songjie
- 2025 10(4):66-76[Abstract](687)[PDF](513)
- Extended Mirror Theory and Its Applications in Message Authentication Codes
- ZHANG Ping, QIN Jiaqi
- 2025 10(4):77-90[Abstract](545)[PDF](505)
- Robust Image Perturbation Based on Multi-Forgery Model Adversarial Optimization
- MU Wenpeng, WANG Jinwei, CHEN Beijin, NIE Lina, MO Haolan, XU Fei
- 2025 10(4):91-103[Abstract](607)[PDF](514)
- Research on Verification Method of Processor Prediction Vulnerabilities Based on Model Checking
- YE Qingyu, KE Qian, WANG Haixia, QIU Pengfei, LIU Chang, WANG Dongsheng
- 2025 10(4):104-119[Abstract](412)[PDF](380)
- Human-Cyber-Physical Collaborative Countermeasure Models for Critical Infrastructure Security
- ZHU Peidong, KANG Wenjie, LIU Liang, ZHANG Rui, XUN Peng
- 2025 10(4):120-137[Abstract](469)[PDF](368)
See more articles>>
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2025 Vol.10(4):1-9 [Abstract](22068) [[PDF](394.10 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2025 Vol.10(4):37-51 [Abstract](17771) [[PDF](1.64 M)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2025 Vol.10(4):1-10 [Abstract](22610) [[PDF](479.57 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2025 Vol.10(4):87-104 [Abstract](19585) [[PDF](1.06 M)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2025 Vol.10(4):21-36 [Abstract](19525) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2025 Vol.10(4):10-20 [Abstract](18701) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2025 Vol.10(4):1-15 [Abstract](18337) [[PDF](935.57 K)
|