- Identify the Mapping of Java Method and Native Function for Android Applications Based on Simulated Execution
- XU Guanhong, FU Jianming, NIE Yu, XIE Mengfei
- 2025 10(3):1-17[Abstract](143)[PDF](33)
- Research on Federated Density-Based Clustering Based on Secure Multi-Party Computation
- SHEN Xuhong, YU Haining, WANG Xiaoyu
- 2025 10(3):18-34[Abstract](125)[PDF](22)
- Threat Intelligence Mining Based on Target Recognition and Topic-Guided Dialogue in Underground Markets
- LUO Shuangchun, HUANG Cheng, SUN Enbo
- 2025 10(3):35-47[Abstract](112)[PDF](26)
- Trusted Decentralized Storage Network Based on Identity Authorization
- ZHANG Jingyu, LIU Qi, PENG Hongrui, YANG Zenghui, YUAN Kaiguo, LI Xiaoyong
- 2025 10(3):48-60[Abstract](99)[PDF](27)
- Research on IPv6 Topology Inference Methods with Network Tomography
- JIN Rui, LI Haotian, WEI Songjie
- 2025 10(3):61-73[Abstract](87)[PDF](20)
- A Review of Cyberspace Mimic Defense Research
- LI Bingxuan, CHEN Shizhan, XU Guangquan, JIA Yungang, WANG Cong, XUE Fei, WANG Xiao, WANG Wei, LI Zhetao, LI Jianxin
- 2025 10(3):74-97[Abstract](96)[PDF](27)
- A Survey: Malware Detection Based on Deep Learning
- YAN Pei, TAN Shunquan, HUANG Jiwu
- 2025 10(3):98-119[Abstract](172)[PDF](32)
- A Survey of Privacy Security for Graph Neural Networks
- CHEN Jinyin, MA Minying, MA Haonan, ZHENG Haibin
- 2025 10(3):120-151[Abstract](113)[PDF](19)
- Blockchain-based Crowdsourcing Mechanism
- ZHANG Zhujun, ZHU Dali, FAN Wei, MI Baoxin, PENG Cheng
- 2025 10(3):152-168[Abstract](78)[PDF](19)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2025 Vol.10(3):1-10 [Abstract](20595) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2025 Vol.10(3):37-51 [Abstract](15425) [[PDF](1.64 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2025 Vol.10(3):1-9 [Abstract](19526) [[PDF](394.10 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2025 Vol.10(3):87-104 [Abstract](15830) [[PDF](1.06 M)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2025 Vol.10(3):21-36 [Abstract](17098) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2025 Vol.10(3):10-20 [Abstract](16157) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2025 Vol.10(3):1-15 [Abstract](15366) [[PDF](935.57 K)
|