- Research on Firmware Vulnerability Discovery Technology Based on Reaching Definition Analysis
- MEI Runyuan, WANG Yanhao, LI Zichuan, PENG Guojun
- 2025 10(2):1-16[Abstract](522)[PDF](136)
- Black-box Testing Method for Web Authentication Bypass Vulnerability Based on Response Similarity Determination
- SONG Hong, MA Junlong, WANG Weiping, ZHU Yilang, WANG Jianxing
- 2025 10(2):17-29[Abstract](319)[PDF](116)
- Research on Dynamic Trust Evaluation Method Based on Federated Learning
- SHI Ruisheng, FU Tong, LIN Ziding, LAN Lina, JIANG Ning
- 2025 10(2):30-47[Abstract](442)[PDF](119)
- Binary Comparison Techniques: Applications, Approaches, and Challenges
- HU Mengying, WANG Xiaoke, ZHAO Lei
- 2025 10(2):48-66[Abstract](268)[PDF](110)
- Similarity Analysis of National Network and Operator’s Network
- ZHU Jinyu, ZHANG Yu, WANG Yunan, Z HANG Hongli, FANG Binxing
- 2025 10(2):67-83[Abstract](227)[PDF](100)
- A Deep Learning Visualization Classification Method for Malicious Code Based on Enhanced Gray Level Co-occurrence Matrix
- WANG Jinwei, CHEN Zhengjia, XIE Xue, LUO Xiangyang, MA Bin
- 2025 10(2):84-102[Abstract](299)[PDF](101)
- A Rapid Identification Method for Risk Areas Affected by BGP Anomalies
- LIU Zimian, QIU Han, WANG Rui, ZHU Junhu, WANG Qingxian
- 2025 10(2):103-115[Abstract](293)[PDF](102)
- Research on Multi-order GMM-ResNet Fusion for Speech Deepfake Detection
- CAO Mingming, LEI Zhenchun, YANG Yingen, ZHOU Yong
- 2025 10(2):116-126[Abstract](240)[PDF](85)
- Research on Introducing Global Semantic Enhancement for Face Fraud Feature Extraction
- CAI Tijian, CHEN Jun, LUO Ciyong, LIU Zunxiong, CHEN Zihan
- 2025 10(2):127-138[Abstract](276)[PDF](89)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2025 Vol.10(2):1-10 [Abstract](20020) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2025 Vol.10(2):37-51 [Abstract](14903) [[PDF](1.64 M)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2025 Vol.10(2):87-104 [Abstract](15414) [[PDF](1.06 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2025 Vol.10(2):1-9 [Abstract](18926) [[PDF](394.10 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2025 Vol.10(2):21-36 [Abstract](16598) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2025 Vol.10(2):10-20 [Abstract](15719) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2025 Vol.10(2):1-15 [Abstract](14858) [[PDF](935.57 K)
|