Volume 6,Issue 2,2021 Table of Contents

   
Other Issues:  
  

Contents

Power Spectrum Based Wi-Fi RF Fingerprint Extraction Method
  CHEN Tianshu, HU Aiqun and JIANG Yu
  Published April 18, 2021
  2021,6(2):1-11 [Abstract]  [View PDF(1.84 M)]
  
The Concept Evolution Analysis of Social Engineering
  WANG Zuoguang, ZHU Hongsong and SUN Limin
  Published April 18, 2021
  2021,6(2):12-29 [Abstract]  [View PDF(716.97 K)]
  
A Survey of Reverse Link Prediction Methods on Graphs
  LI Jing, JIANG Zhongyuan and MA Jianfeng
  Published April 18, 2021
  2021,6(2):30-45 [Abstract]  [View PDF(723.95 K)]
  
A Survey of Distributed SDN Controller Placement Problem
  CAI Ning, HAN Yanni, AN Wei and XU Zhen
  Published April 18, 2021
  2021,6(2):46-72 [Abstract]  [View PDF(1.20 M)]
  
A Survey on Security Development of Searchable Symmetric Encryption
  LIU Wenxin and GAO Ying
  Published April 18, 2021
  2021,6(2):73-84 [Abstract]  [View PDF(1.72 M)]
  
Overview of blockchain consensus algorithm
  JIN Shixiong, ZHANG Xiaodan, Ge Jingguo, SHI Hongbin, SUN Yi, Li Ming, LIN Yeming and YAO Zhongjiang
  Published April 18, 2021
  2021,6(2):85-100 [Abstract]  [View PDF(1.47 M)]
  
Research on the detection method of electromagnetic information leakage from display by machine learning
  GUAN Tianmin, HAN Zhenzhong and MAO Jian
  Published April 18, 2021
  2021,6(2):101-109 [Abstract]  [View PDF(1.90 M)]
  
WHID Defense: Detection and Protection Technology for USB HID Attack
  LV Zhiqiang, XUE Yanan, ZHANG Ning, FENG Zhaowen and JIN Zhongfeng
  Published April 18, 2021
  2021,6(2):110-128 [Abstract]  [View PDF(2.36 M)]
  
Robust Malicious Encrypted Traffic Detection based with Multiple Features
  LI Huihui, Zhang Shigeng, Song Hong and Wang Weiping
  Published April 18, 2021
  2021,6(2):129-142 [Abstract]  [View PDF(1007.92 K)]
  
Covert Communication Technology Based on Bitcoin
  LV Jingshu and CAO Xiaochun
  Published April 18, 2021
  2021,6(2):143-152 [Abstract]  [View PDF(576.53 K)]