| |
| Automatic Data Generation of DNS-Based Exfiltration for AI-Model Training |
| | FENG Lin, CUI Xiang, WANG Zhongru, GAN Ruiling, DIAO Jiawen, HAN Dongxu and JIANG Hai |
| | Published January 18, 2021 |
| | 2021,6(1):1-16 [Abstract] [View PDF(2.06 M)] |
| | |
| DDoS detection and mitigation Framework in SDN |
| | JIA Kun, WANG Junnan and LIU Feng |
| | Published January 18, 2021 |
| | 2021,6(1):17-31 [Abstract] [View PDF(1.12 M)] |
| | |
| Research on MOOC Cheating Detection Based on Deep Learning |
| | WAN Ziyun, CHEN Shiwei, QIN Bin, NIE Wei and XU Ming |
| | Published January 18, 2021 |
| | 2021,6(1):32-39 [Abstract] [View PDF(913.81 K)] |
| | |
| Powershell malware detection method based on features combination |
| | LIU Yue, LIU Baoxu, ZHAO Zihao, LIU Chaoge, WANG Xiaoxi and WU Xianda |
| | Published January 18, 2021 |
| | 2021,6(1):40-53 [Abstract] [View PDF(2.56 M)] |
| | |
| Cross domain authentication and key agreement protocol based on blockchain in edge computing environment |
| | ZHANG Jinhua, LI Xiaowei, ZENG Xin, ZHAO Yuqin, DUAN Ran and YANG Dengqi |
| | Published January 18, 2021 |
| | 2021,6(1):54-61 [Abstract] [View PDF(839.89 K)] |
| | |
| Cybersecurity Talents Intelligent Evaluation Based on Bayesian Knowledge Tracing Model |
| | ZHANG Fangjiao, ZHAO Jianjun, LIU Xinyu, WANG Xiaolei, LIU Qixu and CUI Xiang |
| | Published January 18, 2021 |
| | 2021,6(1):62-77 [Abstract] [View PDF(1.39 M)] |
| | |
| Secure computing outsourcing scheme for polynomial with privacy protection based on blockchain |
| | GUO Zhen, ZHANG Yin, AN Fanglin, ZHAO Kejie, ZHANG Wenjie and YE Jun |
| | Published January 18, 2021 |
| | 2021,6(1):78-89 [Abstract] [View PDF(888.42 K)] |
| | |