- Optimization for GPU-based Elliptic Curve Library and Related Algorithms
- GAO Yuyang, ZHANG Jianning, WANG Gang, SU Ming, LIU Xiaoguang
- 2024 9(6):1-16[Abstract](705)[PDF](364)
- Few-Shot Log Anomaly Detection via Large Language Models
- YUAN Ziyi, ZHANG Haoxing, ZHANG Yuanyuan, WU Gaofei, ZHANG Yuqing
- 2024 9(6):17-27[Abstract](780)[PDF](431)
- Malware Homology Analysis under Diverse Compilation Environments
- LIU Xinyi, PENG Guojun, LIU Side, YANG Xiuzhang, FU Jianming
- 2024 9(6):28-42[Abstract](576)[PDF](365)
- Differential Privacy Scheme for Digital Microfluidic Biochips
- CHEN Xiao, DONG Chen
- 2024 9(6):43-59[Abstract](559)[PDF](355)
- Generating Adversarial Malware Examples Based on Saliency Analysis
- ZHAN Dazhi, SUN Yi, ZHANG Lei, LIU Xin, GUO Shize, PAN Zhisong
- 2024 9(6):60-73[Abstract](646)[PDF](334)
- A Survey of Cyber Threat Intelligence Entity Recognition Research
- WANG Xuren, WEI Xinxin, WANG Yuanyuan, JIANG Zhengwei, JIANG Jun, YANG Peian, LIU Runshi
- 2024 9(6):74-99[Abstract](867)[PDF](407)
- Relation Mining and Attention Based Anomaly Detection for Multivariate Time Series
- HU Zhichao, YU Xiangzhan, LIU Likun, ZHANG Yu, YU Haining
- 2024 9(6):100-113[Abstract](740)[PDF](320)
- Research on PHP Injection Vulnerability Detection Method Based on Intermediate Language
- ZHANG Guodong, LIU Zilong, YAO Tianyu, JIN Zhuo, SUN Donghong, QIN Jiawei
- 2024 9(6):114-128[Abstract](238)[PDF](121)
- A Malicious User Geolocation Method on Tantan App with Distance Transition
- GUO Jiashan, DU Shaoyong, SHI Wenqi, LIU Ruiting, LUO Xiangyang
- 2024 9(6):129-139[Abstract](228)[PDF](135)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2024 Vol.9(6):1-10 [Abstract](18329) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2024 Vol.9(6):37-51 [Abstract](13775) [[PDF](1.64 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2024 Vol.9(6):1-9 [Abstract](17123) [[PDF](394.10 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2024 Vol.9(6):87-104 [Abstract](14311) [[PDF](1.06 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2024 Vol.9(6):1-15 [Abstract](13749) [[PDF](935.57 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2024 Vol.9(6):21-36 [Abstract](15255) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2024 Vol.9(6):10-20 [Abstract](14525) [[PDF](7.66 M)
|