Netinfo Security最新文献

筛选
英文 中文
Virtual Identity Identification Based on Semantic for Network Trading Platform 基于语义的网络交易平台虚拟身份识别
Netinfo Security Pub Date : 2020-12-10 DOI: 10.3969/J.ISSN.1671-1122.2020.12.007
Xuan Zhang, Deyu Yuan, Bo Jin
{"title":"Virtual Identity Identification Based on Semantic for Network Trading Platform","authors":"Xuan Zhang, Deyu Yuan, Bo Jin","doi":"10.3969/J.ISSN.1671-1122.2020.12.007","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.12.007","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130154022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intel SGX-based Proof of Encryption in Clouds 基于英特尔sgx的云加密证明
Netinfo Security Pub Date : 2020-12-10 DOI: 10.3969/J.ISSN.1671-1122.2020.12.001
Weijing You, Limin Liu, Yue Ma, Dongbing Han
{"title":"An Intel SGX-based Proof of Encryption in Clouds","authors":"Weijing You, Limin Liu, Yue Ma, Dongbing Han","doi":"10.3969/J.ISSN.1671-1122.2020.12.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.12.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"9 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116958411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on k-anonymity Algorithm for Personalized Quasi-identifier Attributes 个性化准标识符属性的k-匿名算法研究
Netinfo Security Pub Date : 2020-10-10 DOI: 10.3969/J.ISSN.1671-1122.2020.10.003
Jingsha He, Jinhui Du, Nafei Zhu
{"title":"Research on k-anonymity Algorithm for Personalized Quasi-identifier Attributes","authors":"Jingsha He, Jinhui Du, Nafei Zhu","doi":"10.3969/J.ISSN.1671-1122.2020.10.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.10.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114925342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Assessment Method of Side Channel Information Leakage Based on t-test 基于t检验的侧信道信息泄漏评估方法研究
Netinfo Security Pub Date : 2020-10-10 DOI: 10.3969/J.ISSN.1671-1122.2020.10.008
Kai Wang, Pengfei Guo, Cong Zhou, Yingjian Yan
{"title":"Research on the Assessment Method of Side Channel Information Leakage Based on t-test","authors":"Kai Wang, Pengfei Guo, Cong Zhou, Yingjian Yan","doi":"10.3969/J.ISSN.1671-1122.2020.10.008","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.10.008","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Malicious Network Traffic Based on Improved Bilinear Convolutional Neural Network 基于改进双线性卷积神经网络的恶意网络流量分类
Netinfo Security Pub Date : 2020-10-10 DOI: 10.3969/J.ISSN.1671-1122.2020.10.009
Zhaojun Gu, Jintao Hao, Jingxian Zhou
{"title":"Classification of Malicious Network Traffic Based on Improved Bilinear Convolutional Neural Network","authors":"Zhaojun Gu, Jintao Hao, Jingxian Zhou","doi":"10.3969/J.ISSN.1671-1122.2020.10.009","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.10.009","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115062015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Thinking on Promoting the Application of Cryptography Fusion 推进密码融合应用的研究与思考
Netinfo Security Pub Date : 2020-10-10 DOI: 10.3969/J.ISSN.1671-1122.2020.10.001
Wei Huo
{"title":"Research and Thinking on Promoting the Application of Cryptography Fusion","authors":"Wei Huo","doi":"10.3969/J.ISSN.1671-1122.2020.10.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.10.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133427722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Zero Trust Network Research Based on Overlay Technology 基于覆盖技术的零信任网络研究
Netinfo Security Pub Date : 2020-10-10 DOI: 10.3969/J.ISSN.1671-1122.2020.10.011
Yuan Liu, Chengcai Sun, Yanling Zhang
{"title":"A Zero Trust Network Research Based on Overlay Technology","authors":"Yuan Liu, Chengcai Sun, Yanling Zhang","doi":"10.3969/J.ISSN.1671-1122.2020.10.011","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.10.011","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"394 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124185746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Privacy Preserving and Access Control in Blockchain Based on Attribute-based Encryption 基于属性加密的区块链隐私保护和访问控制方法
Netinfo Security Pub Date : 2020-09-10 DOI: 10.3969/J.ISSN.1671-1122.2020.09.010
Jinmiao Wang, Yong-qiang Xie, Guowei Wang, Yiting Li
{"title":"A Method of Privacy Preserving and Access Control in Blockchain Based on Attribute-based Encryption","authors":"Jinmiao Wang, Yong-qiang Xie, Guowei Wang, Yiting Li","doi":"10.3969/J.ISSN.1671-1122.2020.09.010","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.010","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Quantitative Analysis of System Security Based on Stochastic Petri Net 基于随机Petri网的系统安全性定量分析研究
Netinfo Security Pub Date : 2020-09-10 DOI: 10.3969/J.ISSN.1671-1122.2020.09.006
Zenan Wu, Liqin Tian, Nan Chen
{"title":"Research on Quantitative Analysis of System Security Based on Stochastic Petri Net","authors":"Zenan Wu, Liqin Tian, Nan Chen","doi":"10.3969/J.ISSN.1671-1122.2020.09.006","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.006","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130213467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generation of Malicious Domain Training Data Based on Improved Char-RNN Model 基于改进Char-RNN模型的恶意域训练数据生成
Netinfo Security Pub Date : 2020-09-10 DOI: 10.3969/J.ISSN.1671-1122.2020.09.002
Jing Wu, Tianliang Lu, Yanhui Du
{"title":"Generation of Malicious Domain Training Data Based on Improved Char-RNN Model","authors":"Jing Wu, Tianliang Lu, Yanhui Du","doi":"10.3969/J.ISSN.1671-1122.2020.09.002","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.002","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127682719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信