Netinfo Security最新文献

筛选
英文 中文
Android Malicious Process Identification Method Based on Abnormal Encrypted Traffic Annotation 基于异常加密流量标注的Android恶意进程识别方法
Netinfo Security Pub Date : 2020-07-10 DOI: 10.3969/J.ISSN.1671-1122.2020.07.004
G. Xu
{"title":"Android Malicious Process Identification Method Based on Abnormal Encrypted Traffic Annotation","authors":"G. Xu","doi":"10.3969/J.ISSN.1671-1122.2020.07.004","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.07.004","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Java Deserialization Vulnerability Gadget Chain Discovery Method Based on Bytecode Search 基于字节码搜索的Java反序列化漏洞小部件链发现方法
Netinfo Security Pub Date : 2020-07-10 DOI: 10.3969/J.ISSN.1671-1122.2020.07.003
Xiaoyu Du, He Ye, W. Wen
{"title":"Java Deserialization Vulnerability Gadget Chain Discovery Method Based on Bytecode Search","authors":"Xiaoyu Du, He Ye, W. Wen","doi":"10.3969/J.ISSN.1671-1122.2020.07.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.07.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116027703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Host Fingerprint Anti-detection Model Based on SDN 基于SDN的主机指纹防检测模型
Netinfo Security Pub Date : 2020-07-10 DOI: 10.3969/J.ISSN.1671-1122.2020.07.005
Tao Zhang, Bin Lu, Ding Li, Kang He
{"title":"A Host Fingerprint Anti-detection Model Based on SDN","authors":"Tao Zhang, Bin Lu, Ding Li, Kang He","doi":"10.3969/J.ISSN.1671-1122.2020.07.005","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.07.005","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124666183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parallel Implementation of SM4 Algorithm on GPU SM4算法在GPU上的并行实现
Netinfo Security Pub Date : 2020-06-10 DOI: 10.3969/J.ISSN.1671-1122.2020.06.005
Xiuying Li, Chen Ji, Xiaoyi Duan, Changchun Zhou
{"title":"Parallel Implementation of SM4 Algorithm on GPU","authors":"Xiuying Li, Chen Ji, Xiaoyi Duan, Changchun Zhou","doi":"10.3969/J.ISSN.1671-1122.2020.06.005","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.06.005","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130887874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Graph Information Collection Method Based on Local Differential Privacy in Big Data Environment 大数据环境下基于局部差分隐私的图信息采集方法
Netinfo Security Pub Date : 2020-06-10 DOI: 10.3969/J.ISSN.1671-1122.2020.06.006
Jiacheng Zhang, Jia Peng, Lei Wang
{"title":"A Graph Information Collection Method Based on Local Differential Privacy in Big Data Environment","authors":"Jiacheng Zhang, Jia Peng, Lei Wang","doi":"10.3969/J.ISSN.1671-1122.2020.06.006","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.06.006","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"65 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121011466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Virtual SDN Network Embedding Algorithm Based on Fruit Fly Optimization 基于果蝇优化的虚拟SDN网络嵌入算法
Netinfo Security Pub Date : 2020-06-10 DOI: 10.3969/J.ISSN.1671-1122.2020.06.008
Jinpeng Ran, Xiang Wang, Shanghong Zhao, Hanghang Gao
{"title":"Virtual SDN Network Embedding Algorithm Based on Fruit Fly Optimization","authors":"Jinpeng Ran, Xiang Wang, Shanghong Zhao, Hanghang Gao","doi":"10.3969/J.ISSN.1671-1122.2020.06.008","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.06.008","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126270763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Covert Channel Construction Method Based on HTTP Protocol Combination 基于HTTP协议组合的隐蔽信道构建方法研究
Netinfo Security Pub Date : 2020-06-10 DOI: 10.3969/J.ISSN.1671-1122.2020.06.007
Cheng Chen, Senlin Luo, Qian Wu, Peng Yang
{"title":"Research on Covert Channel Construction Method Based on HTTP Protocol Combination","authors":"Cheng Chen, Senlin Luo, Qian Wu, Peng Yang","doi":"10.3969/J.ISSN.1671-1122.2020.06.007","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.06.007","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134418704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Portrait Intelligent Analysis Application and Algorithm Optimization in Video Investigation 人像智能分析在视频调查中的应用及算法优化
Netinfo Security Pub Date : 2020-05-10 DOI: 10.3969/J.ISSN.1671-1122.2020.05.011
Lei Zhang, Jingtao Huang, Tao-Hong Zhang, S. Wang
{"title":"Portrait Intelligent Analysis Application and Algorithm Optimization in Video Investigation","authors":"Lei Zhang, Jingtao Huang, Tao-Hong Zhang, S. Wang","doi":"10.3969/J.ISSN.1671-1122.2020.05.011","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.05.011","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123318408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Trusted QoS-Aware Path Finding and Load Balancing in Service Composition 服务组合中可信任qos感知的寻路与负载均衡研究
Netinfo Security Pub Date : 2020-05-10 DOI: 10.3969/J.ISSN.1671-1122.2020.05.004
Xuewen Dong, Qihang Liu
{"title":"Research on Trusted QoS-Aware Path Finding and Load Balancing in Service Composition","authors":"Xuewen Dong, Qihang Liu","doi":"10.3969/J.ISSN.1671-1122.2020.05.004","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.05.004","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133396257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network 基于联邦学习和卷积神经网络的入侵检测方法
Netinfo Security Pub Date : 2020-04-10 DOI: 10.3969/J.ISSN.1671-1122.2020.04.006
Rong Wang, C. Ma, Peng Wu
{"title":"An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network","authors":"Rong Wang, C. Ma, Peng Wu","doi":"10.3969/J.ISSN.1671-1122.2020.04.006","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.04.006","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"885 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131306088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信