Netinfo SecurityPub Date : 2021-10-10DOI: 10.3969/J.ISSN.1671-1122.2021.10.003
Luxin Zheng, Jian Zhang
{"title":"Threats and Future Development Trends to the Cloud Security","authors":"Luxin Zheng, Jian Zhang","doi":"10.3969/J.ISSN.1671-1122.2021.10.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2021.10.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Netinfo SecurityPub Date : 2021-04-10DOI: 10.3969/J.ISSN.1671-1122.2021.04.001
Yu Zhang, Guangmin Sun, Yu Li
{"title":"Research on Mobile Internet Authentication Scheme Based on SM9 Algorithm","authors":"Yu Zhang, Guangmin Sun, Yu Li","doi":"10.3969/J.ISSN.1671-1122.2021.04.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2021.04.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131560771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Netinfo SecurityPub Date : 2021-03-10DOI: 10.3969/J.ISSN.1671-1122.2021.03.001
Changhui Huang, Guangjun Hu, Haiwei Li
{"title":"Research on Unknown Threat Blocking Technology of Web Application Based on URL Intelligent Whitelist","authors":"Changhui Huang, Guangjun Hu, Haiwei Li","doi":"10.3969/J.ISSN.1671-1122.2021.03.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2021.03.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124563792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Netinfo SecurityPub Date : 2021-03-10DOI: 10.3969/J.ISSN.1671-1122.2021.03.002
Xiaofeng Lu, Song Fu
{"title":"A Trusted Data Access Control Scheme Combining Attribute-based Encryption and Blockchain","authors":"Xiaofeng Lu, Song Fu","doi":"10.3969/J.ISSN.1671-1122.2021.03.002","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2021.03.002","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121513137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Netinfo SecurityPub Date : 2021-02-10DOI: 10.3969/J.ISSN.1671-1122.2021.02.007
Huazhong Wang, Qiuyue Cheng
{"title":"Research on Intrusion Detection of Industrial Control System Based on Improved Whale Algorithm","authors":"Huazhong Wang, Qiuyue Cheng","doi":"10.3969/J.ISSN.1671-1122.2021.02.007","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2021.02.007","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123541450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Netinfo SecurityPub Date : 2021-02-10DOI: 10.3969/J.ISSN.1671-1122.2021.02.001
Ye Du, Zimeng Wang, Meihong Li
{"title":"Industrial Control Intrusion Detection Method Based on Optimized Kernel Extreme Learning Machine","authors":"Ye Du, Zimeng Wang, Meihong Li","doi":"10.3969/J.ISSN.1671-1122.2021.02.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2021.02.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126116535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}