Volume 5,Issue 4,2020 Table of Contents

   
Other Issues:  
  

Contents

前言
  龚晓锐,张超
  Published 8月 18日, 2020
  2020,5(4):0 [Abstract]  [View PDF(124.72 K)]
  
Intelligent vulnerability detection system based on abstract syntax tree
  CHEN Zhaoxuan, ZOU Deqing, LI Zhen and JIN Hai
  Published 8月 18日, 2020
  2020,5(4):1-13 [Abstract]  [View PDF(942.20 K)]
  
Poisoning Attack and Defense on Deep learning Model: A Survey
  CHEN Jinyin, ZOU Jianfei, SU Mengmeng and ZHANG Longyuan
  Published 8月 18日, 2020
  2020,5(4):14-29 [Abstract]  [View PDF(2.34 M)]
  
The Defense Method for Code-Injection Attacks Based on Instruction Set Randomization
  MA Bolin, ZHANG Zheng, CHEN Yuan and WU Jiangxing
  Published 8月 18日, 2020
  2020,5(4):30-43 [Abstract]  [View PDF(1.50 M)]
  
MVX-CFI: a practical active defense framework for software security
  YAO Dong, ZHANG Zheng, ZHANG Gaofei and WU Jiangxing
  Published 8月 18日, 2020
  2020,5(4):44-54 [Abstract]  [View PDF(690.84 K)]
  
Explore-Exploit: A Security Competition Modeling the Real-world Network Penetration Scenario
  ZHANG Xiu, LIU Baoxu, GONG Xiaorui, YU Lei and SONG Zhenyu
  Published 8月 18日, 2020
  2020,5(4):55-71 [Abstract]  [View PDF(5.16 M)]
  
Survey on Resource Consumption Attacks and Defenses in Software-Defined Networking
  XU Jianfeng, WANG Liming and XU Zhen
  Published 8月 18日, 2020
  2020,5(4):72-95 [Abstract]  [View PDF(1.12 M)]
  
Overview of Network Intrusion Detection Technology
  JIAN Shijie, LU Zhigang, DU Dan, JIANG Bo and LIU Baoxu
  Published 8月 18日, 2020
  2020,5(4):96-122 [Abstract]  [View PDF(1.03 M)]
  
Malware Detection Method Based on Low-level Data Flow Analysis
  HAN Jinrong, ZHANG Yuantong, ZHU Ziyuan and MENG Dan
  Published 8月 18日, 2020
  2020,5(4):123-137 [Abstract]  [View PDF(1.41 M)]
  
A Survey on Honeypots of Internet of Things
  YOU Jianzhou, LV Shichao, SUN Yuyan, SHI Zhiqiang and SUN Limin
  Published 8月 18日, 2020
  2020,5(4):138-156 [Abstract]  [View PDF(2.35 M)]