- Optimization for GPU-based Elliptic Curve Library and Related Algorithms
- GAO Yuyang, ZHANG Jianning, WANG Gang, SU Ming, LIU Xiaoguang
- 2024 9(6):1-16[Abstract](1741)[PDF](792)
- Few-Shot Log Anomaly Detection via Large Language Models
- YUAN Ziyi, ZHANG Haoxing, ZHANG Yuanyuan, WU Gaofei, ZHANG Yuqing
- 2024 9(6):17-27[Abstract](2242)[PDF](1051)
- Malware Homology Analysis under Diverse Compilation Environments
- LIU Xinyi, PENG Guojun, LIU Side, YANG Xiuzhang, FU Jianming
- 2024 9(6):28-42[Abstract](1210)[PDF](657)
- Differential Privacy Scheme for Digital Microfluidic Biochips
- CHEN Xiao, DONG Chen
- 2024 9(6):43-59[Abstract](1119)[PDF](628)
- Generating Adversarial Malware Examples Based on Saliency Analysis
- ZHAN Dazhi, SUN Yi, ZHANG Lei, LIU Xin, GUO Shize, PAN Zhisong
- 2024 9(6):60-73[Abstract](1398)[PDF](624)
- A Survey of Cyber Threat Intelligence Entity Recognition Research
- WANG Xuren, WEI Xinxin, WANG Yuanyuan, JIANG Zhengwei, JIANG Jun, YANG Peian, LIU Runshi
- 2024 9(6):74-99[Abstract](1973)[PDF](760)
- Relation Mining and Attention Based Anomaly Detection for Multivariate Time Series
- HU Zhichao, YU Xiangzhan, LIU Likun, ZHANG Yu, YU Haining
- 2024 9(6):100-113[Abstract](1583)[PDF](564)
- Research on PHP Injection Vulnerability Detection Method Based on Intermediate Language
- ZHANG Guodong, LIU Zilong, YAO Tianyu, JIN Zhuo, SUN Donghong, QIN Jiawei
- 2024 9(6):114-128[Abstract](793)[PDF](398)
- A Malicious User Geolocation Method on Tantan App with Distance Transition
- GUO Jiashan, DU Shaoyong, SHI Wenqi, LIU Ruiting, LUO Xiangyang
- 2024 9(6):129-139[Abstract](688)[PDF](372)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2024 Vol.9(6):1-10 [Abstract](19116) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2024 Vol.9(6):37-51 [Abstract](14274) [[PDF](1.64 M)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2024 Vol.9(6):87-104 [Abstract](14748) [[PDF](1.06 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2024 Vol.9(6):1-9 [Abstract](17986) [[PDF](394.10 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2024 Vol.9(6):21-36 [Abstract](15820) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2024 Vol.9(6):10-20 [Abstract](15041) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2024 Vol.9(6):1-15 [Abstract](14206) [[PDF](935.57 K)
|