[1] |
ZHAO Zhiyan, JI Xiaomo.
Research on the Intelligent Fusion Model of Network Security Situation Awareness
[J]. Netinfo Security, 2020, 20(4): 87-93.
|
[2] |
JING Tao, WAN Wei.
Research on a P2P Network Communication Behavior Analytical Method for Status Migration Attribute-oriented
[J]. Netinfo Security, 2020, 20(1): 16-25.
|
[3] |
QIU Yue.
Network Security Risk Analysis and Assessment of Large-scale Sports Events
[J]. Netinfo Security, 2019, 19(9): 61-65.
|
[4] |
GAO Mengru, XIE Fangjun, DONG Hongqin, LIN Xiang.
Research on Network Security Evaluation System Oriented to Critical Information Infrastructure
[J]. Netinfo Security, 2019, 19(9): 111-114.
|
[5] |
SHANG Wenli, YIN Long, LIU Xianda, ZHAO Jianming.
Construction Technology and Application of Industrial Control System Security and Trusted Environment
[J]. Netinfo Security, 2019, 19(6): 1-10.
|
[6] |
ZHANG Ke, WANG Youjie, CHENG Shaoyin, WANG Lidong.
Intrusion Collaborative Disposal Method of Spoofed IP Address in DDoS Attacks
[J]. 信息网络安全, 2019, 19(5): 22-29.
|
[7] |
FU Jianming, LI Lin, ZHENG Rui, Suriguga.
Survey of Network Attack Detection Based on GAN
[J]. 信息网络安全, 2019, 19(2): 1-9.
|
[8] |
WEI Li, DUAN Qin, LIU Zhiwei.
A Summary of Medical Information Security Management in Internet Era
[J]. Netinfo Security, 2019, 19(12): 88-92.
|
[9] |
ZI Ran, LIU Jia.
Research on Construction of Risk and Trust Architecture Based on Lean Trust
[J]. Netinfo Security, 2019, 19(10): 32-41.
|
[10] |
QU Jie, FAN Chunling, CHEN Guangyong, ZHAO Jintao.
Research on Establishment of Network Security Service Ability System for A New Era
[J]. 信息网络安全, 2019, 19(1): 83-87.
|
[11] |
LU Gang, GUO Ronghua, ZHOU Ying, WANG Jun.
Review of Malicious Traffic Feature Extraction
[J]. 信息网络安全, 2018, 18(9): 1-9.
|
[12] |
LI Yi, GU Jian, GU Tiejun.
Knowledge Modeling and Application of Quality Evaluation System for Complex Network Security Product
[J]. 信息网络安全, 2018, 18(9): 55-59.
|
[13] |
ZHANG Gelin, LI Yong.
Non-negative Matrix Factorization Optimization and Its Application in Network Intrusion Detection
[J]. 信息网络安全, 2018, 18(8): 73-78.
|
[14] |
ZHANG Jianbiao, XU Wanshan, LIU Guojie, YANG Fan.
A Trusted Connection Architecture Based on Network Behavior Analysis
[J]. 信息网络安全, 2018, 18(3): 78-85.
|
[15] |
YI Huifan, WAN Liang, HUANG Nana, WANG Kunpeng.
Research on Attacker Modeling Method of Security Protocol Based on SPIN
[J]. 信息网络安全, 2018, 18(2): 61-70.
|