| |
| Automatic Data Generation of DNS-Based Exfiltration for AI-Model Training |
| FENG Lin, CUI Xiang, WANG Zhongru, GAN Ruiling, DIAO Jiawen, HAN Dongxu and JIANG Hai |
| Published January 18, 2021 |
| 2021,6(1):1-16 [Abstract] [View PDF(2.06 M)] |
| |
| DDoS detection and mitigation Framework in SDN |
| JIA Kun, WANG Junnan and LIU Feng |
| Published January 18, 2021 |
| 2021,6(1):17-31 [Abstract] [View PDF(1.12 M)] |
| |
| Research on MOOC Cheating Detection Based on Deep Learning |
| WAN Ziyun, CHEN Shiwei, QIN Bin, NIE Wei and XU Ming |
| Published January 18, 2021 |
| 2021,6(1):32-39 [Abstract] [View PDF(913.81 K)] |
| |
| Powershell malware detection method based on features combination |
| LIU Yue, LIU Baoxu, ZHAO Zihao, LIU Chaoge, WANG Xiaoxi and WU Xianda |
| Published January 18, 2021 |
| 2021,6(1):40-53 [Abstract] [View PDF(2.56 M)] |
| |
| Cross domain authentication and key agreement protocol based on blockchain in edge computing environment |
| ZHANG Jinhua, LI Xiaowei, ZENG Xin, ZHAO Yuqin, DUAN Ran and YANG Dengqi |
| Published January 18, 2021 |
| 2021,6(1):54-61 [Abstract] [View PDF(839.89 K)] |
| |
| Cybersecurity Talents Intelligent Evaluation Based on Bayesian Knowledge Tracing Model |
| ZHANG Fangjiao, ZHAO Jianjun, LIU Xinyu, WANG Xiaolei, LIU Qixu and CUI Xiang |
| Published January 18, 2021 |
| 2021,6(1):62-77 [Abstract] [View PDF(1.39 M)] |
| |
| Secure computing outsourcing scheme for polynomial with privacy protection based on blockchain |
| GUO Zhen, ZHANG Yin, AN Fanglin, ZHAO Kejie, ZHANG Wenjie and YE Jun |
| Published January 18, 2021 |
| 2021,6(1):78-89 [Abstract] [View PDF(888.42 K)] |
| |