Volume 7,Issue 2,2022 Table of Contents

   
Other Issues:  
  

Contents

An AAC Steganographic Algorithm Based on Joint Distortion
  CAI Sen, REN Yanzhen, WANG Lina
  Published March 18, 2022
  2022,7(2):1-15 [Abstract]  [View PDF(3.16 M)]
  
Effectiveness and Performance Analysis of Moving Target Defense System: MTTF and Job Completion Time Perspectives
  CHEN Zhi, CHANG Xiaolin, YANG Runkai, HAN Zhen
  Published March 18, 2022
  2022,7(2):16-29 [Abstract]  [View PDF(2.93 M)]
  
GPU Virtualization Technology and Security Issues: A Survey
  Wu Zailong, Wang Liming, Xu Zhen, Li hongjia, Yang Jing
  Published March 18, 2022
  2022,7(2):30-58 [Abstract]  [View PDF(2.33 M)]
  
A Survey for Security of IoT Wireless Protocols
  ZHANG Weikang, ZENG Fanping, TAO Yufan, LI Xiangyang
  Published March 18, 2022
  2022,7(2):59-71 [Abstract]  [View PDF(872.66 K)]
  
An Anonymous Network Deception Method Based on Container Fingerprint Modification for SaaS Applications
  LI Lingshu, WU Jiangxing, LIU Wenyan
  Published March 18, 2022
  2022,7(2):72-86 [Abstract]  [View PDF(798.02 K)]
  
Bionic Control Mechanism Based Research of Endogenous Immune Architecture for Information System
  LI Tao, HU Aiqun, FANG Lanting
  Published March 18, 2022
  2022,7(2):87-100 [Abstract]  [View PDF(969.36 K)]
  
A Comprehensive Survey of Security Situational Awareness on Industrial Control Systems
  ZHOU Ming, LV Shichao, YOU Jianzhou, ZHU Hongsong, SHI Zhiqiang, SUN Limin
  Published March 18, 2022
  2022,7(2):101-119 [Abstract]  [View PDF(2.62 M)]
  
A Malware Detection Method Based on Hybrid Feature for Mobile Terminals
  Yao Ye, Qian Liang, Zhu Yian, Zhang Lixiang, Jia Yao, Du Jiawei, Niu Juntao
  Published March 18, 2022
  2022,7(2):120-138 [Abstract]  [View PDF(761.64 K)]
  
The Trusted Traceability System of Agricultural Internet of Things Based on Blockchain
  CHEN Jinwen, LUO Decun, TANG Chengjun, TANG Chenjun, DING Yong
  Published March 18, 2022
  2022,7(2):139-149 [Abstract]  [View PDF(1.25 M)]
  
Smart Contract with Fully Homomorphic Encryption under Edge Computing Mode
  YANG Yatao, LIN Tianxiang, CHEN Jianyuan, ZENG Ping, LIU Peihe
  Published March 18, 2022
  2022,7(2):150-162 [Abstract]  [View PDF(1.55 M)]
  
ITTDAF: Decentralized Authorization Framework That Does Not Rely on The Transmission of Parent Permission Information
  LUO Qifeng, SHI Ruisheng
  Published March 18, 2022
  2022,7(2):163-173 [Abstract]  [View PDF(534.52 K)]