|  | 
 Volume 7,Issue 2,2022 Table of Contents Contents |  |  |  |  | An AAC Steganographic Algorithm Based on Joint Distortion |  |  | CAI Sen, REN Yanzhen, WANG Lina |  |  | Published March 18, 2022 |  |  | 2022,7(2):1-15 [Abstract]  [View PDF(3.16 M)] |  |  |  |  |  | Effectiveness and Performance Analysis of Moving Target Defense System: MTTF and Job Completion Time Perspectives |  |  | CHEN Zhi, CHANG Xiaolin, YANG Runkai, HAN Zhen |  |  | Published March 18, 2022 |  |  | 2022,7(2):16-29 [Abstract]  [View PDF(2.93 M)] |  |  |  |  |  | GPU Virtualization Technology and Security Issues: A Survey |  |  | Wu Zailong, Wang Liming, Xu Zhen, Li hongjia, Yang Jing |  |  | Published March 18, 2022 |  |  | 2022,7(2):30-58 [Abstract]  [View PDF(2.33 M)] |  |  |  |  |  | A Survey for Security of IoT Wireless Protocols |  |  | ZHANG Weikang, ZENG Fanping, TAO Yufan, LI Xiangyang |  |  | Published March 18, 2022 |  |  | 2022,7(2):59-71 [Abstract]  [View PDF(872.66 K)] |  |  |  |  |  | An Anonymous Network Deception Method Based on Container Fingerprint Modification for SaaS Applications |  |  | LI Lingshu, WU Jiangxing, LIU Wenyan |  |  | Published March 18, 2022 |  |  | 2022,7(2):72-86 [Abstract]  [View PDF(798.02 K)] |  |  |  |  |  | Bionic Control Mechanism Based Research of Endogenous Immune Architecture for Information System |  |  | LI Tao, HU Aiqun, FANG Lanting |  |  | Published March 18, 2022 |  |  | 2022,7(2):87-100 [Abstract]  [View PDF(969.36 K)] |  |  |  |  |  | A Comprehensive Survey of Security Situational Awareness on Industrial Control Systems |  |  | ZHOU Ming, LV Shichao, YOU Jianzhou, ZHU Hongsong, SHI Zhiqiang, SUN Limin |  |  | Published March 18, 2022 |  |  | 2022,7(2):101-119 [Abstract]  [View PDF(2.62 M)] |  |  |  |  |  | A Malware Detection Method Based on Hybrid Feature for Mobile Terminals |  |  | Yao Ye, Qian Liang, Zhu Yian, Zhang Lixiang, Jia Yao, Du Jiawei, Niu Juntao |  |  | Published March 18, 2022 |  |  | 2022,7(2):120-138 [Abstract]  [View PDF(761.64 K)] |  |  |  |  |  | The Trusted Traceability System of Agricultural Internet of Things Based on Blockchain |  |  | CHEN Jinwen, LUO Decun, TANG Chengjun, TANG Chenjun, DING Yong |  |  | Published March 18, 2022 |  |  | 2022,7(2):139-149 [Abstract]  [View PDF(1.25 M)] |  |  |  |  |  | Smart Contract with Fully Homomorphic Encryption under Edge Computing Mode |  |  | YANG Yatao, LIN Tianxiang, CHEN Jianyuan, ZENG Ping, LIU Peihe |  |  | Published March 18, 2022 |  |  | 2022,7(2):150-162 [Abstract]  [View PDF(1.55 M)] |  |  |  |  |  | ITTDAF: Decentralized Authorization Framework That Does Not Rely on The Transmission of Parent Permission Information |  |  | LUO Qifeng, SHI Ruisheng |  |  | Published March 18, 2022 |  |  | 2022,7(2):163-173 [Abstract]  [View PDF(534.52 K)] |  |  |  | 
 |