Netinfo SecurityPub Date : 2020-03-10DOI: 10.3969/J.ISSN.1671-1122.2020.03.001
Li Ma
{"title":"Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity","authors":"Li Ma","doi":"10.3969/J.ISSN.1671-1122.2020.03.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.03.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127432296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Netinfo SecurityPub Date : 2020-02-10DOI: 10.3969/J.ISSN.1671-1122.2020.02.009
Hao Zhang, Chen Long, W. Zhiqiang
{"title":"Abnormal Traffic Detection Technology Based on Data Augmentation and Model Update","authors":"Hao Zhang, Chen Long, W. Zhiqiang","doi":"10.3969/J.ISSN.1671-1122.2020.02.009","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.02.009","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123077263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Netinfo SecurityPub Date : 2020-02-10DOI: 10.3969/J.ISSN.1671-1122.2020.02.010
Zhaoxuan Ji, Zhi Yang, Y. Sun, Yiwei Shan
{"title":"GPU High Speed Implementation of SHA1 in Big Data Environment","authors":"Zhaoxuan Ji, Zhi Yang, Y. Sun, Yiwei Shan","doi":"10.3969/J.ISSN.1671-1122.2020.02.010","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.02.010","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123148567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Netinfo SecurityPub Date : 2020-01-10DOI: 10.3969/J.ISSN.1671-1122.2020.01.007
Yuan Tao, Tao Huang, Mo-yan Li, Wei Hu
{"title":"Research on Log Audit Analysis Model of Cyberspace Security Classified Protection Driven by Knowledge Map","authors":"Yuan Tao, Tao Huang, Mo-yan Li, Wei Hu","doi":"10.3969/J.ISSN.1671-1122.2020.01.007","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.01.007","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130000633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}