[1] |
Die HU, Dongtang MA, Ming GONG, Zhao MA.
A Physical Layer Security Authentication Method Based on PUF
[J]. Netinfo Security, 2020, 20(1): 61-66.
|
[2] |
Chunhe TAO, Xi ZHANG, Zhen WANG, Xiaoying GAN.
Research on Analysis Method of Fund Trading Network
[J]. Netinfo Security, 2019, 19(9): 51-55.
|
[3] |
Xin SONG, Kai ZHAO, Linlin ZHANG, Wenbo FANG.
Research on Android Malware Detection Based on Random Forest
[J]. Netinfo Security, 2019, 19(9): 1-5.
|
[4] |
Zewen MA, Yang LIU, Hongping XU, Hang YI.
DoS Traffic Identification Technology Based on Integrated Learning
[J]. Netinfo Security, 2019, 19(9): 115-119.
|
[5] |
Yongcheng DUAN, Yuqing WANG, Xin LI, Le YANG.
RSAR-based Random Forest Network Security Situation Factor Extraction
[J]. Netinfo Security, 2019, 19(7): 75-81.
|
[6] |
Ronglei HU, Wenjing LI, Hua JIANG, Xinran ZHANG.
Certificateless Aggregation Signcryption Scheme Based on Discrete Logarithm
[J]. Netinfo Security, 2019, 19(7): 42-49.
|
[7] |
Leihua ZHANG, Hongtai NIU, Zhongni WANG, Xuehong LIU.
Research on the Construction of Early Warning Model of Criminals Based on Big Data
[J]. Netinfo Security, 2019, 19(4): 82-89.
|
[8] |
Liangfeng ZHANG, Yi WANG, Yuanyi WU, Rui KONG.
Statistics-based Browser Fingerprint Acquisition Technology
[J]. Netinfo Security, 2019, 19(11): 49-55.
|
[9] |
Liming ZUO, Kaiyu HU, Mengli ZHANG, Pingping XIA.
A Short Identity-based Signature Scheme with Bilateral Security
[J]. Netinfo Security, 2018, 18(7): 47-54.
|
[10] |
ZHAI Jiqiang, XIAO Yajun, YANG Hailu, WANG Jian.
Reseach on U2R Attacks Detection Based on Improved Artificial Bee Colony Combined with Optimized Random Forest
[J]. 信息网络安全, 2018, 18(12): 38-45.
|
[11] |
Yulei ZHANG, Yanli MA, Wenjing LIU, Caifen WANG.
A Certificate Denial Authentication Encryption Schemes with Privacy Protection Features
[J]. Netinfo Security, 2018, 18(10): 62-69.
|
[12] |
Yanan CHEN, Qian MEI, Hu XIONG, Weixiang XU.
Certificateless Parallel Key-insulated Signature for Industrial Internet of Things
[J]. Netinfo Security, 2018, 18(10): 1-9.
|
[13] |
Jian ZHOU, Liyan SUN, Aihua DUAN, Wenjun SHI.
Regional Autonomous Identity Authentication Management Scheme for Space Self-organized Networks
[J]. Netinfo Security, 2017, 17(8): 45-52.
|
[14] |
Weiping WEN, Shilin JIA, Jiawei DU, Ce QIN.
Analysis and Improvement of Windows Heap Randomization
[J]. Netinfo Security, 2017, 17(7): 1-10.
|
[15] |
Weining LIN, Mingzhi CHEN, Yunqing ZHAN, Chuanbao LIU.
Research on an Intrusion Detection Algorithm Based on PCA and Random-forest Classification
[J]. Netinfo Security, 2017, 17(11): 50-54.
|