[1] |
Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU.
Research on 5G Network Slicing Security Model
[J]. Netinfo Security, 2020, 20(4): 1-11.
|
[2] |
Zhiyan ZHAO, Xiaomo JI.
Research on the Intelligent Fusion Model of Network Security Situation Awareness
[J]. Netinfo Security, 2020, 20(4): 87-93.
|
[3] |
Weimin LANG, Han ZHANG, Yifeng ZHAO, Jinfang YAO.
A Blockchain-based Behavior Regulation and Activities Management Scheme for Internet of Things
[J]. Netinfo Security, 2020, 20(2): 22-29.
|
[4] |
Hao ZHANG, Long CHEN, Zhiqiang WEI.
Abnormal Traffic Detection Technology Based on Data Augmentation and Model Update
[J]. Netinfo Security, 2020, 20(2): 66-74.
|
[5] |
Ronglei HU, Wenjing LI, Hua JIANG, Xinran ZHANG.
Certificateless Aggregation Signcryption Scheme Based on Discrete Logarithm
[J]. Netinfo Security, 2019, 19(7): 42-49.
|
[6] |
Chunguang MA, Yaoyao GUO, Peng WU, Haibo LIU.
Review of Image Enhancement Based on Generative Adversarial Networks
[J]. Netinfo Security, 2019, 19(5): 10-12.
|
[7] |
Ziwen SUN, Yichao ZHANG.
Deep Belief Network Model for Mobile Terminal Identity Authentication
[J]. Netinfo Security, 2019, 19(3): 34-42.
|
[8] |
Zhenfeng ZHANG, Zhiwen ZHANG, Ruichao WANG.
Model of Cloud Computing Security and Compliance Capability for Classified Protection of Cybersecurity 2.0
[J]. Netinfo Security, 2019, 19(11): 1-7.
|
[9] |
Quanming LIU, Jie FENG, Yinnan LI, Shasha SU.
A HIBE Scheme of Differentiates the Number of Identity Layers
[J]. Netinfo Security, 2019, 19(11): 14-23.
|
[10] |
Benxia LI, Hui XIA, Sanshun ZHANG.
A Trust-based Multicast Routing Protocol
[J]. Netinfo Security, 2019, 19(1): 59-67.
|
[11] |
Yingchao YU, Lin DING, Zuoning CHEN.
Research on Attacks and Defenses towards Machine Learning Systems
[J]. Netinfo Security, 2018, 18(9): 10-18.
|
[12] |
Kaizhong ZUO, Jian TAO, Haiyan ZENG, Liping SUN.
Algorithm for Trajectory Movement Pattern Mining Based on Semantic Space Anonymity
[J]. Netinfo Security, 2018, 18(8): 34-42.
|
[13] |
Liming ZUO, Kaiyu HU, Mengli ZHANG, Pingping XIA.
A Short Identity-based Signature Scheme with Bilateral Security
[J]. Netinfo Security, 2018, 18(7): 47-54.
|
[14] |
Weijun ZHU, Yongwen FAN, Shaohuan BAN.
A Mimic-automaton-based Model for the MSISDN Virtualization and Its Method for Verifying the Security
[J]. Netinfo Security, 2018, 18(4): 15-22.
|
[15] |
Yong YU, Changgeng CHEN, Qiang LIU, Jiaxi LIU.
Trust Chain Model and Trust Relation Analysis of Component-based Software System
[J]. Netinfo Security, 2018, 18(3): 8-13.
|