-
341
Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
342
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
343
Adaptive digital watermarking algorithm under image quad-tree partition
Published 2017-12-01“…网络与信息安全学报…”
Get full text
Article -
344
Bitcoin blockchain based information convert transmission
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
345
Network security equipment evaluation based on attack tree with risk fusion
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
346
Adversarial attacks and defenses in deep learning
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
347
Community detection in multiplex networks via consensus matrix
Published 2017-09-01“…网络与信息安全学报…”
Get full text
Article -
348
Analysis and enlightenment on the cybersecurity strategy of various countries in the world
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article -
349
Research on privacy preserving mechanism of attribute-based encryption cloud storage
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
350
Multi-feature fusion malware detection method based on attention and gating mechanisms
Published 2024-02-01“…网络与信息安全学报…”
Get full text
Article -
351
Research and application of defense mechanism for prompt injection attack of large language model in financial industry
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
352
Study on shared key management scheme for WSN based on LEACH protocol
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
353
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
354
-
355
Design and analysis of enterprise management system framework based on blockchain
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
356
Development of the blockchain curriculum system based on the PRIDE teaching mode
Published 2024-02-01“…网络与信息安全学报…”
Get full text
Article -
357
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01“…网络与信息安全学报…”
Get full text
Article -
358
Overview on industrial Internet honeynet technology
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
359
Analytic provenance for criminal intelligence analysis
Published 2018-02-01“…网络与信息安全学报…”
Get full text
Article -
360
Embedding of national cryptographic algorithm in Hyperledger Fabric
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article