[1] |
Tao JING, Wei WAN.
Research on a P2P Network Communication Behavior Analytical Method for Status Migration Attribute-oriented
[J]. Netinfo Security, 2020, 20(1): 16-25.
|
[2] |
Liangchen CHEN, Shu GAO, Baoxu LIU, Zhigang LU.
Research Status and Development Trends on Network Encrypted Traffic Identification
[J]. Netinfo Security, 2019, 19(3): 19-25.
|
[3] |
Weichao YANG, Yuanbo GUO, Ya ZHONG, Shuaihui ZHEN.
IoT Traffic Anomaly Detection Based on Device Type Identification and BP Neural Network
[J]. Netinfo Security, 2019, 19(12): 53-63.
|
[4] |
Xudong WANG, Xiangzhan YU, Hongli ZHANG.
Research on Traffic Identification Technology for Unknown Protocols
[J]. Netinfo Security, 2019, 19(10): 74-83.
|
[5] |
Xiaohong ZHANG, Jiaqi ZHANG.
Research on the Zero-forcing Precoding Anti-collision Algorithm Based on Frame Slot for RFID System
[J]. Netinfo Security, 2018, 18(2): 34-39.
|
[6] |
Guojun MA, Kai LI, Qingqi PEI, Yang ZHAN.
A Fine-Grained Face Privacy Protection Scheme in Social Networks
[J]. Netinfo Security, 2017, 17(8): 26-32.
|
[7] |
Zhuojian JIANG, Chunhua WU, Ming XIA.
Research and Implementation on Multi-Layer User Classification Method Based on Cloud System
[J]. Netinfo Security, 2017, 17(8): 69-75.
|
[8] |
Xiangshen MIN, Xuefeng ZHANG.
A New Algorithm of the Location of Fingerprint Core in Cloud Computing
[J]. Netinfo Security, 2017, 17(7): 59-65.
|
[9] |
LI Lianglei, SHAO Lisong, WANG Chuanyong, LIU Yong.
The Scheme of Open Authorization Based on FIDO UAF
[J]. 信息网络安全, 2017, 17(6): 35-42.
|
[10] |
REN Dong, SONG Wei, YU Jing, JIANG Wei.
A Survey on Special Video Content Detection Algorithms
[J]. 信息网络安全, 2016, 16(9): 184-191.
|
[11] |
Shaopeng GUAN, Xin GE, Yuan ZHANG, Sheng ZHONG.
Research on Privacy Preserving ECG-based Identification Technology
[J]. Netinfo Security, 2016, 16(8): 1-5.
|
[12] |
Jianjun LIN, Bogang LIN, Yang YANG, Bo SUN.
Design and Implementation of Mobile Phone Application Recognition System Based on Traffic Analysis
[J]. Netinfo Security, 2016, 16(8): 39-45.
|
[13] |
WANG Jing-zhong, WANG Wei-meng.
Research on FTP Protocol Identification Method Based on Tagged Word
[J]. 信息网络安全, 2015, 15(7): 26-31.
|
[14] |
MU Zheng, WU Jin, XU Shu-juan.
Research on P2P Traffic Identification Under the High Speed Network
[J]. 信息网络安全, 2015, 15(5): 69-76.
|
[15] |
SHANG Shi-ze, KONG Xiang-wei, YOU Xin-gang.
A Survey of Digital Passive Lossless Forensics on Forged and Altered Document
[J]. 信息网络安全, 2015, 15(4): 62-67.
|