[1] |
Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU.
Research on 5G Network Slicing Security Model
[J]. Netinfo Security, 2020, 20(4): 1-11.
|
[2] |
Zhaoxuan JI, Zhi YANG, Yu SUN, Yiwei SHAN.
GPU High Speed Implementation of SHA1 in Big Data Environment
[J]. Netinfo Security, 2020, 20(2): 75-82.
|
[3] |
Yongheng XIE, Yubo FENG, Qingfeng DONG, Mei WANG.
Research on Data Ingestion Method Based on Deep Learning
[J]. Netinfo Security, 2019, 19(9): 36-40.
|
[4] |
Liangchen CHEN, Baoxu LIU, Shu GAO.
Research on Traffic Data Sampling Technology in Network Attack Detection
[J]. Netinfo Security, 2019, 19(8): 22-28.
|
[5] |
Yi WEN, Xingshu CHEN, Xuemei ZENG, Yonggang LUO.
DNS Protocol Restore System for Security Analysis Based on Large-scale Network
[J]. Netinfo Security, 2019, 19(5): 77-83.
|
[6] |
Yitao NI, Yongjia CHEN, Bogang LIN.
Automatic De-obfuscation-based Malicious Webpages Detection
[J]. Netinfo Security, 2019, 19(4): 37-46.
|
[7] |
Liangchen CHEN, Shu GAO, Baoxu LIU, Zhigang LU.
Research Status and Development Trends on Network Encrypted Traffic Identification
[J]. Netinfo Security, 2019, 19(3): 19-25.
|
[8] |
Jian ZHANG, Bohan CHEN, Liangyi GONG, Zhaojun GU.
Research on Malware Detection Technology Based on Image Analysis
[J]. Netinfo Security, 2019, 19(10): 24-31.
|
[9] |
Tianxiong WU, Xingshu CHEN, Yonggang LUO.
Research and Implementation of Application Program Protection Mechanism under Big Data Platform
[J]. Netinfo Security, 2019, 19(1): 68-75.
|
[10] |
Ronglei HU, Yanqiong HE, Ping ZENG, Xiaohong FAN.
Design and Implementation of Medical Privacy Protection Scheme in Big Data Environment
[J]. Netinfo Security, 2018, 18(9): 48-54.
|
[11] |
Xinyang FENG, Jianjing SHEN.
A Yarn and NMF Based Big Data Clustering Algorithm
[J]. Netinfo Security, 2018, 18(8): 43-49.
|
[12] |
Yuan TAO, Tao HUANG, Mohan ZHANG, Shuilin LI.
Research and Development Trend Analysis of Key Technologies for Cyberspace Security Situation Awareness
[J]. Netinfo Security, 2018, 18(8): 79-85.
|
[13] |
Lin YOU, Jiahao LIANG.
Research on Secure Identity Authentication Based on Homomorphic Encryption and Biometric
[J]. Netinfo Security, 2018, 18(4): 1-8.
|
[14] |
Xiuqing LU, Hequn XIAN.
A Big Data Integrity Auditing Scheme Based on User Authorization in Cloud Storage
[J]. Netinfo Security, 2018, 18(4): 32-37.
|
[15] |
Min GUO, Yingming ZENG, Jinli YAO, Xiaowen DA.
The Analysis of Software Behavior Security Based on Big Data Samples
[J]. Netinfo Security, 2017, 17(9): 153-156.
|