| Volume 7,Issue 2,2022 Table of Contents
Contents | | | An AAC Steganographic Algorithm Based on Joint Distortion | | CAI Sen, REN Yanzhen, WANG Lina | | Published March 18, 2022 | | 2022,7(2):1-15 [Abstract] [View PDF(3.16 M)] | | | | Effectiveness and Performance Analysis of Moving Target Defense System: MTTF and Job Completion Time Perspectives | | CHEN Zhi, CHANG Xiaolin, YANG Runkai, HAN Zhen | | Published March 18, 2022 | | 2022,7(2):16-29 [Abstract] [View PDF(2.93 M)] | | | | GPU Virtualization Technology and Security Issues: A Survey | | Wu Zailong, Wang Liming, Xu Zhen, Li hongjia, Yang Jing | | Published March 18, 2022 | | 2022,7(2):30-58 [Abstract] [View PDF(2.33 M)] | | | | A Survey for Security of IoT Wireless Protocols | | ZHANG Weikang, ZENG Fanping, TAO Yufan, LI Xiangyang | | Published March 18, 2022 | | 2022,7(2):59-71 [Abstract] [View PDF(872.66 K)] | | | | An Anonymous Network Deception Method Based on Container Fingerprint Modification for SaaS Applications | | LI Lingshu, WU Jiangxing, LIU Wenyan | | Published March 18, 2022 | | 2022,7(2):72-86 [Abstract] [View PDF(798.02 K)] | | | | Bionic Control Mechanism Based Research of Endogenous Immune Architecture for Information System | | LI Tao, HU Aiqun, FANG Lanting | | Published March 18, 2022 | | 2022,7(2):87-100 [Abstract] [View PDF(969.36 K)] | | | | A Comprehensive Survey of Security Situational Awareness on Industrial Control Systems | | ZHOU Ming, LV Shichao, YOU Jianzhou, ZHU Hongsong, SHI Zhiqiang, SUN Limin | | Published March 18, 2022 | | 2022,7(2):101-119 [Abstract] [View PDF(2.62 M)] | | | | A Malware Detection Method Based on Hybrid Feature for Mobile Terminals | | Yao Ye, Qian Liang, Zhu Yian, Zhang Lixiang, Jia Yao, Du Jiawei, Niu Juntao | | Published March 18, 2022 | | 2022,7(2):120-138 [Abstract] [View PDF(761.64 K)] | | | | The Trusted Traceability System of Agricultural Internet of Things Based on Blockchain | | CHEN Jinwen, LUO Decun, TANG Chengjun, TANG Chenjun, DING Yong | | Published March 18, 2022 | | 2022,7(2):139-149 [Abstract] [View PDF(1.25 M)] | | | | Smart Contract with Fully Homomorphic Encryption under Edge Computing Mode | | YANG Yatao, LIN Tianxiang, CHEN Jianyuan, ZENG Ping, LIU Peihe | | Published March 18, 2022 | | 2022,7(2):150-162 [Abstract] [View PDF(1.55 M)] | | | | ITTDAF: Decentralized Authorization Framework That Does Not Rely on The Transmission of Parent Permission Information | | LUO Qifeng, SHI Ruisheng | | Published March 18, 2022 | | 2022,7(2):163-173 [Abstract] [View PDF(534.52 K)] | | |
|