Abstract is missing.
- Edmund: Entropy based attack Detection and Mitigation engine Using Netflow DataMohammad Hashem Haghighat, Jun Li 0003. 1-6 [doi]
- The Effectiveness Assessment for Network Based MTD StrategiesXinli Xiong, Weiguang Xu, Guangsheng Zhao. 7-11 [doi]
- Security Analysis and Improvement of Partially Blind Proxy Re-signature SchemeXiaoming Hu 0002, Wenrong Jiang, Chuang Ma, Chengcheng Yu. 12-16 [doi]
- A Model for Analyzing the Effectiveness of Moving Target DefenseGuangsheng Zhao, Xinli Xiong, Huaying Wu. 17-21 [doi]
- A Study of Neighbor Users Selection in Email Networks for Spam FilteringYongchao Wang, Yuyan Chao, Lifeng He. 22-26 [doi]
- Attack Intent Analysis Method Based on Attack Path GraphShijin Li, Minchen Zhu, Yanbin Qiu. 27-31 [doi]
- A method of cyber risk control node selection based on Game TheoryYanbin Qiu, Yanhua Liu, Shijin Li. 32-36 [doi]
- Research on Intrusion Detection Method Based on Improved Smote and XGBoostPeihuang Su, Yanhua Liu, Xiang Song. 37-41 [doi]
- Certification and remote attestation methods of the eTPM trusted cloudHaonan Sun, Rongyu He. 42-49 [doi]
- Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-BoxesAthmane Seghier. 50-55 [doi]
- Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web ServersYikun Jiang, Wei Xie, Yong Tang. 56-63 [doi]
- Case Study: Discovering Hardware Trojans Based on model checkingJianfeng Zhao. 64-68 [doi]
- Android Malware Detection Based on Multi-FeaturesXiaojian Liu, Xiaofeng Dong, Qian Lei. 69-73 [doi]
- Enhancing Machine Learning Based Malware Detection Model by Reinforcement LearningCangshuai Wu, Jiangyong Shi, Yuexiang Yang, Wenhua Li. 74-78 [doi]
- A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural NetworkMengli Zhang, Qihui Zhang, Xuexian Hu, Wenfen Liu. 79-83 [doi]
- A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential PrivacyYuxuan Zhang, Jianghong Wei, Xiaojian Zhang, Xuexian Hu, Wenfen Liu. 84-89 [doi]
- Weakness Identification and Flow Analysis Based on Tor NetworkShiyu Shen, Jianlin Gao, Aitian Wu. 90-94 [doi]
- SD-WAN Source Route Based on Protocol-oblivious ForwardingYunfang Chen, Que Wu, Wei Zhang, Qiangchun Liu. 95-99 [doi]
- Multiple Eavesdropper-Based Physical Layer Security in TAS/MRC System With Antenna CorrelationGangcan Sun, Mengge Liu, Zhuo Han. 100-106 [doi]
- Identification Method of Power Spectral Signal Based on Fourier Series Fitting and Density ClusteringXiaodong Bai, Wendeng Zhu, Gengxin Zhang, Tao Hong, Laiding Zhao, Jing Hu. 107-111 [doi]
- Constructing A Novel Spark-based Distributed Maximum Frequent Sequence Pattern Mining for IoT LogXiong Chen, Ruliang Xiao, Xin Du, Xinhong Lin, Li Lin. 112-116 [doi]
- Fast Abnormal Identification for Large Scale Internet TrafficLingjing Kong, Guowei Huang, Ying Zhou, Jianfeng Ye. 117-120 [doi]
- A Modified Source Number Estimation Method based on Wavelet Analysis and Singular Value DecompositionChuanchuan Wang, Yonghu Zeng, Liandong Wang. 121-124 [doi]
- Multi-pattern Matching Algorithm based on Variable Step SizeDapeng Man, Wu Yang 0001, Guoqing Tian. 125-128 [doi]
- Research on Task Scheduling Model for Multi-core ProcessorDapeng Man, Wu Yang 0001, Zeya Lu. 129-133 [doi]
- A Cloud Storage Resource Transaction Mechanism Based on Smart ContractYonggen Gu, Dingding Hou, Xiaohong Wu. 134-138 [doi]
- Parallel Machine Scheduling with Rejection under Special ConditionsShengshi Zheng, Xuerong Yue, Zhibin Chen. 139-143 [doi]
- Research on Kubernetes' Resource Scheduling SchemeWei-Guo Zhang, Xi-Lin Ma, Jin-Zhong Zhang. 144-148 [doi]
- Mixing Matrix Estimation Method for UBSS based on Observed Data SegmentationChuanchuan Wang, Yonghu Zeng, Liandong Wang. 149-154 [doi]
- Stability Analysis of Tail Water Slope out of the Underground Power Station in Hydropower EngineeringXu Zhang, Shaowu Zhou, Peng Lin, Wei Huang, Wendu Li. 155-159 [doi]