| |
| A Survey of Privacy Preserving in Machine Learning |
| ZHAO Zhendong, CHANG Xiaolin and WANG Yixiang |
| Published October 18, 2019 |
| 2019,4(5):1-13 [Abstract] [View PDF(1.08 M)] |
| |
| Cyber Security Posture Analysis based on Spread Logs of Malware |
| WANG Qinqin, ZHOU Hao, YAN Hanbing, MEI Rui and HAN Zhihui |
| Published October 18, 2019 |
| 2019,4(5):14-24 [Abstract] [View PDF(960.69 K)] |
| |
| Intrusion Detection System Based on Hormone-Regulated Immune Network Clustering |
| BAI Lin and YANG Chao |
| Published October 18, 2019 |
| 2019,4(5):25-32 [Abstract] [View PDF(541.75 K)] |
| |
| Java Backdoor Detection Based on Function Code Gadgets |
| LIU Qixu, WANG Baizhu, HU Enze, LIU Jingqiang and LIU Chaoge |
| Published October 18, 2019 |
| 2019,4(5):33-47 [Abstract] [View PDF(1.54 M)] |
| |
| A Fine-grained Trusted Monitoring Measurement Method Based on Security-first Architecture |
| TIAN Jing, SUN Huiqi, WU Xiyao, JIA Xiaoqi, ZHANG Weijuan and HUANG Qingjia |
| Published October 18, 2019 |
| 2019,4(5):48-60 [Abstract] [View PDF(947.01 K)] |
| |
| A Survey of IoT Device Vulnerability Mining Techniques |
| ZHENG Yaowen, WEN Hui, CHENG Kai, SONG Zhanwei, ZHU Hongsong and SUN Limin |
| Published October 18, 2019 |
| 2019,4(5):61-75 [Abstract] [View PDF(521.16 K)] |
| |
| A review of BoT: Blockchain for the Internet of Things |
| SHI Huiyang, LIU Ling and ZHANG Yuqing |
| Published October 18, 2019 |
| 2019,4(5):76-91 [Abstract] [View PDF(612.67 K)] |
| |