Volume 4,Issue 5,2019 Table of Contents

   
Other Issues:  
  

Contents

A Survey of Privacy Preserving in Machine Learning
  ZHAO Zhendong, CHANG Xiaolin and WANG Yixiang
  Published October 18, 2019
  2019,4(5):1-13 [Abstract]  [View PDF(1.08 M)]
  
Cyber Security Posture Analysis based on Spread Logs of Malware
  WANG Qinqin, ZHOU Hao, YAN Hanbing, MEI Rui and HAN Zhihui
  Published October 18, 2019
  2019,4(5):14-24 [Abstract]  [View PDF(960.69 K)]
  
Intrusion Detection System Based on Hormone-Regulated Immune Network Clustering
  BAI Lin and YANG Chao
  Published October 18, 2019
  2019,4(5):25-32 [Abstract]  [View PDF(541.75 K)]
  
Java Backdoor Detection Based on Function Code Gadgets
  LIU Qixu, WANG Baizhu, HU Enze, LIU Jingqiang and LIU Chaoge
  Published October 18, 2019
  2019,4(5):33-47 [Abstract]  [View PDF(1.54 M)]
  
A Fine-grained Trusted Monitoring Measurement Method Based on Security-first Architecture
  TIAN Jing, SUN Huiqi, WU Xiyao, JIA Xiaoqi, ZHANG Weijuan and HUANG Qingjia
  Published October 18, 2019
  2019,4(5):48-60 [Abstract]  [View PDF(947.01 K)]
  
A Survey of IoT Device Vulnerability Mining Techniques
  ZHENG Yaowen, WEN Hui, CHENG Kai, SONG Zhanwei, ZHU Hongsong and SUN Limin
  Published October 18, 2019
  2019,4(5):61-75 [Abstract]  [View PDF(521.16 K)]
  
A review of BoT: Blockchain for the Internet of Things
  SHI Huiyang, LIU Ling and ZHANG Yuqing
  Published October 18, 2019
  2019,4(5):76-91 [Abstract]  [View PDF(612.67 K)]