[1] |
DONG Xiaoli, SHANG Shuai, CHEN Jie.
Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192
[J]. Netinfo Security, 2020, 20(4): 40-46.
|
[2] |
SONG Yubo, FAN Ming, YANG Junjie, HU Aiqun.
Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis
[J]. Netinfo Security, 2020, 20(3): 9-17.
|
[3] |
ZHANG Xinglong, LI Yuting, CHENG Qingfeng, GUO Lulu.
A Browser Security Model for Preventing TLS Protocol Downgrade Attacks
[J]. Netinfo Security, 2020, 20(3): 65-74.
|
[4] |
WANG Tengfei, CAI Manchun, LU Tianliang, YUE Ting.
IPv6 Network Attack Source Tracing Method Based on iTrace_v6
[J]. Netinfo Security, 2020, 20(3): 83-89.
|
[5] |
LI Ruixing, XU Li, FANG He.
Anti-eavesdropping Attack Model Based on Power Control and Relay Cooperation
[J]. Netinfo Security, 2020, 20(1): 40-45.
|
[6] |
DONG Wei, LI Yonggang.
Research on Analysis of Attacks on Smart Grid Network Based on Complex Network
[J]. Netinfo Security, 2020, 20(1): 52-60.
|
[7] |
YUE Qiaoli, LV Wanbo, HU Weihong, ZHANG Haikuo.
Mitigating DDoS Attack Based on DNS Response Value Assessment
[J]. Netinfo Security, 2019, 19(9): 56-60.
|
[8] |
MA Zewen, LIU Yang, XU Hongping, YI Hang.
DoS Traffic Identification Technology Based on Integrated Learning
[J]. Netinfo Security, 2019, 19(9): 115-119.
|
[9] |
CHEN Liangchen, LIU Baoxu, GAO Shu.
Research on Traffic Data Sampling Technology in Network Attack Detection
[J]. Netinfo Security, 2019, 19(8): 22-28.
|
[10] |
ZHANG Kejia, ZHANG Fan, MA Chunguang, ZHANG Long.
New Models to Design Multi-party Quantum Private Comparison Protocols
[J]. Netinfo Security, 2019, 19(8): 29-35.
|
[11] |
CHEN Guanheng, SU Jinshu.
Abnormal Traffic Detection Algorithm Based on Deep Neural Network
[J]. Netinfo Security, 2019, 19(6): 68-75.
|
[12] |
ZHANG Ke, WANG Youjie, CHENG Shaoyin, WANG Lidong.
Intrusion Collaborative Disposal Method of Spoofed IP Address in DDoS Attacks
[J]. 信息网络安全, 2019, 19(5): 22-29.
|
[13] |
YU Zhibin, MA Cheng, LI Siqi, WANG Miao.
Research on DDoS Attack Model Based on Web Application Layer
[J]. 信息网络安全, 2019, 19(5): 84-90.
|
[14] |
FU Jianming, LI Lin, ZHENG Rui, Suriguga.
Survey of Network Attack Detection Based on GAN
[J]. 信息网络安全, 2019, 19(2): 1-9.
|
[15] |
YU Huifang, GAO Xinzhe.
Homomorphic Ring Signature Scheme Technology for Multi-source Network Coding
[J]. 信息网络安全, 2019, 19(2): 36-42.
|