| Volume 5,Issue 4,2020 Table of Contents
Contents | | | 前言 | | 龚晓锐,张超 | | Published 8月 18日, 2020 | | 2020,5(4):0 [Abstract] [View PDF(124.72 K)] | | | | Intelligent vulnerability detection system based on abstract syntax tree | | CHEN Zhaoxuan, ZOU Deqing, LI Zhen and JIN Hai | | Published 8月 18日, 2020 | | 2020,5(4):1-13 [Abstract] [View PDF(942.20 K)] | | | | Poisoning Attack and Defense on Deep learning Model: A Survey | | CHEN Jinyin, ZOU Jianfei, SU Mengmeng and ZHANG Longyuan | | Published 8月 18日, 2020 | | 2020,5(4):14-29 [Abstract] [View PDF(2.34 M)] | | | | The Defense Method for Code-Injection Attacks Based on Instruction Set Randomization | | MA Bolin, ZHANG Zheng, CHEN Yuan and WU Jiangxing | | Published 8月 18日, 2020 | | 2020,5(4):30-43 [Abstract] [View PDF(1.50 M)] | | | | MVX-CFI: a practical active defense framework for software security | | YAO Dong, ZHANG Zheng, ZHANG Gaofei and WU Jiangxing | | Published 8月 18日, 2020 | | 2020,5(4):44-54 [Abstract] [View PDF(690.84 K)] | | | | Explore-Exploit: A Security Competition Modeling the Real-world Network Penetration Scenario | | ZHANG Xiu, LIU Baoxu, GONG Xiaorui, YU Lei and SONG Zhenyu | | Published 8月 18日, 2020 | | 2020,5(4):55-71 [Abstract] [View PDF(5.16 M)] | | | | Survey on Resource Consumption Attacks and Defenses in Software-Defined Networking | | XU Jianfeng, WANG Liming and XU Zhen | | Published 8月 18日, 2020 | | 2020,5(4):72-95 [Abstract] [View PDF(1.12 M)] | | | | Overview of Network Intrusion Detection Technology | | JIAN Shijie, LU Zhigang, DU Dan, JIANG Bo and LIU Baoxu | | Published 8月 18日, 2020 | | 2020,5(4):96-122 [Abstract] [View PDF(1.03 M)] | | | | Malware Detection Method Based on Low-level Data Flow Analysis | | HAN Jinrong, ZHANG Yuantong, ZHU Ziyuan and MENG Dan | | Published 8月 18日, 2020 | | 2020,5(4):123-137 [Abstract] [View PDF(1.41 M)] | | | | A Survey on Honeypots of Internet of Things | | YOU Jianzhou, LV Shichao, SUN Yuyan, SHI Zhiqiang and SUN Limin | | Published 8月 18日, 2020 | | 2020,5(4):138-156 [Abstract] [View PDF(2.35 M)] | | |
|