Netinfo Security最新文献

筛选
英文 中文
A Generation Method of Word-level Adversarial Samples for Chinese Text Classification 面向中文文本分类的词级对抗样本生成方法
Netinfo Security Pub Date : 2020-09-10 DOI: 10.3969/J.ISSN.1671-1122.2020.09.003
Xin Tong, Luona Wang, Runzheng Wang, Jingya Wang
{"title":"A Generation Method of Word-level Adversarial Samples for Chinese Text Classification","authors":"Xin Tong, Luona Wang, Runzheng Wang, Jingya Wang","doi":"10.3969/J.ISSN.1671-1122.2020.09.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129599508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Shifting Security Protection Mindset and Mechanisms for Novel 5G Infrastructures 新型5G基础设施安全保护理念与机制转变
Netinfo Security Pub Date : 2020-09-10 DOI: 10.3969/J.ISSN.1671-1122.2020.09.014
Wenmao Liu, Yang You
{"title":"Shifting Security Protection Mindset and Mechanisms for Novel 5G Infrastructures","authors":"Wenmao Liu, Yang You","doi":"10.3969/J.ISSN.1671-1122.2020.09.014","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.014","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114348597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Network Security States Prediction and Risk Assessment for Industrial Control System Based on HMM 基于HMM的工业控制系统网络安全状态预测与风险评估方法
Netinfo Security Pub Date : 2020-09-10 DOI: 10.3969/J.ISSN.1671-1122.2020.09.012
Shibin Li, Jing Li, Gang Tang, Yi Li
{"title":"Method of Network Security States Prediction and Risk Assessment for Industrial Control System Based on HMM","authors":"Shibin Li, Jing Li, Gang Tang, Yi Li","doi":"10.3969/J.ISSN.1671-1122.2020.09.012","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.012","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on AISecOps Automation Levels and Technology Trends AISecOps自动化水平及技术趋势研究
Netinfo Security Pub Date : 2020-09-10 DOI: 10.3969/J.ISSN.1671-1122.2020.09.005
Zhang Runzi, Liu Wenmao, Yang You, Feng Xie
{"title":"Research on AISecOps Automation Levels and Technology Trends","authors":"Zhang Runzi, Liu Wenmao, Yang You, Feng Xie","doi":"10.3969/J.ISSN.1671-1122.2020.09.005","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.005","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133384586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Log Anomaly Detection Method Based on Improved Time Series Model 基于改进时间序列模型的日志异常检测方法
Netinfo Security Pub Date : 2020-09-10 DOI: 10.3969/J.ISSN.1671-1122.2020.09.001
Jialing Lu
{"title":"Log Anomaly Detection Method Based on Improved Time Series Model","authors":"Jialing Lu","doi":"10.3969/J.ISSN.1671-1122.2020.09.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Active Discovering and Secure Using Method of Hardware Cryptographic Resources Based on TrustZone 基于TrustZone的硬件加密资源主动发现和安全使用方法
Netinfo Security Pub Date : 2020-08-10 DOI: 10.3969/J.ISSN.1671-1122.2020.08.006
Lu Yuan, Chenlin Huang, Yun Li, Hua Cheng
{"title":"An Active Discovering and Secure Using Method of Hardware Cryptographic Resources Based on TrustZone","authors":"Lu Yuan, Chenlin Huang, Yun Li, Hua Cheng","doi":"10.3969/J.ISSN.1671-1122.2020.08.006","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.08.006","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"160 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-based Encryption Scheme without Key Escrow Supporting Attribute Revocation in Cloud Environment 云环境下支持属性撤销的无密钥托管的基于属性的加密方案
Netinfo Security Pub Date : 2020-08-10 DOI: 10.3969/J.ISSN.1671-1122.2020.08.008
Shu-li Song, Xing-lan Zhang
{"title":"Attribute-based Encryption Scheme without Key Escrow Supporting Attribute Revocation in Cloud Environment","authors":"Shu-li Song, Xing-lan Zhang","doi":"10.3969/J.ISSN.1671-1122.2020.08.008","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.08.008","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134338587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A SDN Access Control Mechanism Based on Zero Trust 基于零信任的SDN访问控制机制
Netinfo Security Pub Date : 2020-08-10 DOI: 10.3969/J.ISSN.1671-1122.2020.08.005
Yunkun Wu, Bo Jiang, Ruixuan Pan, Yuling Liu
{"title":"A SDN Access Control Mechanism Based on Zero Trust","authors":"Yunkun Wu, Bo Jiang, Ruixuan Pan, Yuling Liu","doi":"10.3969/J.ISSN.1671-1122.2020.08.005","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.08.005","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Sharing Scheme Based on the Blockchain and the Proxy Re-encryption 基于区块链和代理重加密的数据共享方案
Netinfo Security Pub Date : 2020-08-10 DOI: 10.3969/J.ISSN.1671-1122.2020.08.003
Li Li, Qing-Wei Zeng, Yihong Wen, Shi-Fu Wang
{"title":"Data Sharing Scheme Based on the Blockchain and the Proxy Re-encryption","authors":"Li Li, Qing-Wei Zeng, Yihong Wen, Shi-Fu Wang","doi":"10.3969/J.ISSN.1671-1122.2020.08.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.08.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133534848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Android Application DEX File Protection Method Android应用DEX文件保护方法研究
Netinfo Security Pub Date : 2020-07-10 DOI: 10.3969/J.ISSN.1671-1122.2020.07.007
Xiaoxiao Yuan, Senlin Luo, Peng Yang
{"title":"Research on Android Application DEX File Protection Method","authors":"Xiaoxiao Yuan, Senlin Luo, Peng Yang","doi":"10.3969/J.ISSN.1671-1122.2020.07.007","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.07.007","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129946910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信