- Research on High-Speed Generation Method of Physical Layer Key Based on Dual Carrier
- JIANG Yu, WANG Yuchun, HU Aiqun
- 2025 10(4):1-19[Abstract](896)[PDF](650)
- A Review of Research on Smart Home Rule Interaction Vulnerability Detection
- WANG Jingyao, CHEN Zemao, WANG Tingting
- 2025 10(4):20-39[Abstract](866)[PDF](634)
- SDLDP: A Local Differential Private Framework for Multi-level Sensitive Data
- CHEN Yaqing, YE Yutong, ZHANG Min, SHU Bowen
- 2025 10(4):40-53[Abstract](884)[PDF](607)
- A Method for Calculating Behavioral Risk in Network Systems Based on Lie Group
- XIAO Yuming, ZHAO Xiaolin, LIU Zhenyan, SONG Ce, CHANG Yue
- 2025 10(4):54-65[Abstract](847)[PDF](620)
- Network Intrusion Detection with Deep Neural Network for Supervised Learning of Discrete Hash
- XUE Yin, WEI Songjie
- 2025 10(4):66-76[Abstract](897)[PDF](610)
- Extended Mirror Theory and Its Applications in Message Authentication Codes
- ZHANG Ping, QIN Jiaqi
- 2025 10(4):77-90[Abstract](691)[PDF](584)
- Robust Image Perturbation Based on Multi-Forgery Model Adversarial Optimization
- MU Wenpeng, WANG Jinwei, CHEN Beijin, NIE Lina, MO Haolan, XU Fei
- 2025 10(4):91-103[Abstract](770)[PDF](601)
- Research on Verification Method of Processor Prediction Vulnerabilities Based on Model Checking
- YE Qingyu, KE Qian, WANG Haixia, QIU Pengfei, LIU Chang, WANG Dongsheng
- 2025 10(4):104-119[Abstract](538)[PDF](449)
- Human-Cyber-Physical Collaborative Countermeasure Models for Critical Infrastructure Security
- ZHU Peidong, KANG Wenjie, LIU Liang, ZHANG Rui, XUN Peng
- 2025 10(4):120-137[Abstract](578)[PDF](436)
See more articles>>
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2025 Vol.10(4):1-9 [Abstract](22331) [[PDF](394.10 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2025 Vol.10(4):37-51 [Abstract](18021) [[PDF](1.64 M)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2025 Vol.10(4):1-10 [Abstract](22874) [[PDF](479.57 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2025 Vol.10(4):87-104 [Abstract](19816) [[PDF](1.06 M)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2025 Vol.10(4):21-36 [Abstract](19759) [[PDF](1.16 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2025 Vol.10(4):1-15 [Abstract](18556) [[PDF](935.57 K)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2025 Vol.10(4):10-20 [Abstract](18945) [[PDF](7.66 M)
|