| |
| Power Spectrum Based Wi-Fi RF Fingerprint Extraction Method |
| CHEN Tianshu, HU Aiqun and JIANG Yu |
| Published April 18, 2021 |
| 2021,6(2):1-11 [Abstract] [View PDF(1.84 M)] |
| |
| The Concept Evolution Analysis of Social Engineering |
| WANG Zuoguang, ZHU Hongsong and SUN Limin |
| Published April 18, 2021 |
| 2021,6(2):12-29 [Abstract] [View PDF(716.97 K)] |
| |
| A Survey of Reverse Link Prediction Methods on Graphs |
| LI Jing, JIANG Zhongyuan and MA Jianfeng |
| Published April 18, 2021 |
| 2021,6(2):30-45 [Abstract] [View PDF(723.95 K)] |
| |
| A Survey of Distributed SDN Controller Placement Problem |
| CAI Ning, HAN Yanni, AN Wei and XU Zhen |
| Published April 18, 2021 |
| 2021,6(2):46-72 [Abstract] [View PDF(1.20 M)] |
| |
| A Survey on Security Development of Searchable Symmetric Encryption |
| LIU Wenxin and GAO Ying |
| Published April 18, 2021 |
| 2021,6(2):73-84 [Abstract] [View PDF(1.72 M)] |
| |
| Overview of blockchain consensus algorithm |
| JIN Shixiong, ZHANG Xiaodan, Ge Jingguo, SHI Hongbin, SUN Yi, Li Ming, LIN Yeming and YAO Zhongjiang |
| Published April 18, 2021 |
| 2021,6(2):85-100 [Abstract] [View PDF(1.47 M)] |
| |
| Research on the detection method of electromagnetic information leakage from display by machine learning |
| GUAN Tianmin, HAN Zhenzhong and MAO Jian |
| Published April 18, 2021 |
| 2021,6(2):101-109 [Abstract] [View PDF(1.90 M)] |
| |
| WHID Defense: Detection and Protection Technology for USB HID Attack |
| LV Zhiqiang, XUE Yanan, ZHANG Ning, FENG Zhaowen and JIN Zhongfeng |
| Published April 18, 2021 |
| 2021,6(2):110-128 [Abstract] [View PDF(2.36 M)] |
| |
| Robust Malicious Encrypted Traffic Detection based with Multiple Features |
| LI Huihui, Zhang Shigeng, Song Hong and Wang Weiping |
| Published April 18, 2021 |
| 2021,6(2):129-142 [Abstract] [View PDF(1007.92 K)] |
| |
| Covert Communication Technology Based on Bitcoin |
| LV Jingshu and CAO Xiaochun |
| Published April 18, 2021 |
| 2021,6(2):143-152 [Abstract] [View PDF(576.53 K)] |
| |