Netinfo Security最新文献

筛选
英文 中文
Survey of Trust Management Mechanism in Wireless Sensor Network 无线传感器网络信任管理机制研究
Netinfo Security Pub Date : 2020-04-10 DOI: 10.3969/J.ISSN.1671-1122.2020.04.002
Jinfang Jiang, Guangjie Han
{"title":"Survey of Trust Management Mechanism in Wireless Sensor Network","authors":"Jinfang Jiang, Guangjie Han","doi":"10.3969/J.ISSN.1671-1122.2020.04.002","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.04.002","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125374119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ethereum Malicious Account Detection Method Based on LightGBM 基于LightGBM的以太坊恶意账户检测方法
Netinfo Security Pub Date : 2020-04-10 DOI: 10.3969/J.ISSN.1671-1122.2020.04.009
Lingyu Bian, Linlin Zhang, Kai Zhao, Fei Shi
{"title":"Ethereum Malicious Account Detection Method Based on LightGBM","authors":"Lingyu Bian, Linlin Zhang, Kai Zhao, Fei Shi","doi":"10.3969/J.ISSN.1671-1122.2020.04.009","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.04.009","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114538176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on 5G Network Slicing Security Model 5G网络切片安全模型研究
Netinfo Security Pub Date : 2020-04-10 DOI: 10.3969/J.ISSN.1671-1122.2020.04.001
Jianwei Liu, Yiran Han, B. Liu, Beiyuan Yu
{"title":"Research on 5G Network Slicing Security Model","authors":"Jianwei Liu, Yiran Han, B. Liu, Beiyuan Yu","doi":"10.3969/J.ISSN.1671-1122.2020.04.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.04.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123267677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity 网络安全分类保护评估结论定量计算方法研究
Netinfo Security Pub Date : 2020-03-10 DOI: 10.3969/J.ISSN.1671-1122.2020.03.001
Li Ma
{"title":"Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity","authors":"Li Ma","doi":"10.3969/J.ISSN.1671-1122.2020.03.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.03.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127432296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abnormal Traffic Detection Technology Based on Data Augmentation and Model Update 基于数据增强和模型更新的异常流量检测技术
Netinfo Security Pub Date : 2020-02-10 DOI: 10.3969/J.ISSN.1671-1122.2020.02.009
Hao Zhang, Chen Long, W. Zhiqiang
{"title":"Abnormal Traffic Detection Technology Based on Data Augmentation and Model Update","authors":"Hao Zhang, Chen Long, W. Zhiqiang","doi":"10.3969/J.ISSN.1671-1122.2020.02.009","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.02.009","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123077263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GPU High Speed Implementation of SHA1 in Big Data Environment SHA1在大数据环境下的GPU高速实现
Netinfo Security Pub Date : 2020-02-10 DOI: 10.3969/J.ISSN.1671-1122.2020.02.010
Zhaoxuan Ji, Zhi Yang, Y. Sun, Yiwei Shan
{"title":"GPU High Speed Implementation of SHA1 in Big Data Environment","authors":"Zhaoxuan Ji, Zhi Yang, Y. Sun, Yiwei Shan","doi":"10.3969/J.ISSN.1671-1122.2020.02.010","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.02.010","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123148567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Log Audit Analysis Model of Cyberspace Security Classified Protection Driven by Knowledge Map 知识地图驱动的网络空间安全分类保护日志审计分析模型研究
Netinfo Security Pub Date : 2020-01-10 DOI: 10.3969/J.ISSN.1671-1122.2020.01.007
Yuan Tao, Tao Huang, Mo-yan Li, Wei Hu
{"title":"Research on Log Audit Analysis Model of Cyberspace Security Classified Protection Driven by Knowledge Map","authors":"Yuan Tao, Tao Huang, Mo-yan Li, Wei Hu","doi":"10.3969/J.ISSN.1671-1122.2020.01.007","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.01.007","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130000633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Authentication Protocol for RFID/NFC Based on Elliptic Curve Cryptography 基于椭圆曲线密码的RFID/NFC安全认证协议
Netinfo Security Pub Date : 2019-12-10 DOI: 10.3969/J.ISSN.1671-1122.2019.12.008
Yongshuang Wei, Jianhua Chen, Yongmei Wei
{"title":"Security Authentication Protocol for RFID/NFC Based on Elliptic Curve Cryptography","authors":"Yongshuang Wei, Jianhua Chen, Yongmei Wei","doi":"10.3969/J.ISSN.1671-1122.2019.12.008","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2019.12.008","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"22 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116554204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
《信息安全技术 网络安全等级保护测评要求》(GB/T 28448-2019)标准解读 《信息安全技术 网络安全等级保护测评要求》(GB/T 28448-2019)标准解读
Netinfo Security Pub Date : 2019-07-19 DOI: 10.3969/J.ISSN.1671-1122.2019.07.001
陈广勇, 祝国邦, 范春玲
{"title":"《信息安全技术 网络安全等级保护测评要求》(GB/T 28448-2019)标准解读","authors":"陈广勇, 祝国邦, 范春玲","doi":"10.3969/J.ISSN.1671-1122.2019.07.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2019.07.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Hybrid Network Coding Scheme Against Pollution Attacks 一种抗污染攻击的有效混合网络编码方案
Netinfo Security Pub Date : 2019-05-10 DOI: 10.3969/J.ISSN.1671-1122.2019.05.009
Yaxuan Wang, Xi-Jun Lin, Haipeng Qu
{"title":"An Effective Hybrid Network Coding Scheme Against Pollution Attacks","authors":"Yaxuan Wang, Xi-Jun Lin, Haipeng Qu","doi":"10.3969/J.ISSN.1671-1122.2019.05.009","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2019.05.009","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128434596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信