Abstract is missing.
- An Intelligent Data Flow Security Strategy Model of Cloud-Network IntegrationNishui Cai, Zhuxiang Deng, Hao Wang. 3-27 [doi]
- Applying a Random Forest Approach to Imbalanced Dataset on Network Monitoring AnalysisQian Chen, Xing Zhang, Ying Wang, Zhijia Zhai, Fen Yang. 28-37 [doi]
- Brief Analysis for Network Security Issues in Mega-Projects Approved for Data ClustersShizhan Lan, Jing Huang. 38-50 [doi]
- Considerations on Evaluation of Practical Cloud Data ProtectionRui Mei, Han-Bing Yan, Yongqiang He, Qinqin Wang, Shengqiang Zhu, Weiping Wen. 51-69 [doi]
- A Self-supervised Adversarial Learning Approach for Network Intrusion Detection SystemLirui Deng, Youjian Zhao, Heng Bao. 73-85 [doi]
- Anomaly Detection of E-commerce Econnoisseur Based on User BehaviorYangyu Long, Wei Zhao, Jilong Yang, Jincheng Deng, Fangming Liu. 86-98 [doi]
- CMPD: Context-Based Malicious Parameter Detection for APIsZhangjie Zhao, Lin Zhang, Xing Zhang, Ying Wang, Yi Qin. 99-112 [doi]
- Webpage Tampering Detection Method Based on BiGRU-CRF-RCNNXiangyu Fan, Jilong Yang, Wei Zhao, Jincheng Deng, Fangming Liu. 113-126 [doi]
- Detecting Bitcoin Nodes by the Cyberspace Search EnginesRuiguang Li, Jiawei Zhu, Jiaqi Gao, Fudong Wu, Dawei Xu, Liehuang Zhu. 129-138 [doi]
- Research on Bitcoin Anti-anonymity Technology Based on Behavior Vectors Mapping and Aligning ModelShenwen Lin, Hongliang Mao, Zhen Wu, Jinglin Yang. 139-147 [doi]
- Improving Deepfake Video Detection with Comprehensive Self-consistency LearningHeng Bao, Lirui Deng, Jiazhi Guan, Liang Zhang, Xunxun Chen. 151-161 [doi]
- Research on Information Security Asset Value Assessment MethodologyXueqin Yang, Peng Yang, HongGang Lin. 162-174 [doi]
- Knowledge Graph Construction Research From Multi-source Vulnerability IntelligenceLin Du, Chuanqi Xu. 177-184 [doi]
- Research and Practice of TCP Protocol Optimization in Mobile InternetShizhan Lan, Lifang Ma, Jing Huang. 187-196 [doi]
- Research on Adversarial Patch Attack Defense Method for Traffic Sign DetectionYanjing Zhang, Jianming Cui, Ming Liu. 199-210 [doi]
- Research on Named Entity Recognition Method of Network Threat IntelligenceKeke Zhang, Xu Chen, Yongjun Jing, Shuyang Wang, Lijun Tang. 213-224 [doi]
- Research on the Recognition of Internet Buzzword Features Based on TransformerDawei Xu, Yijie She, Zhonghua Tan, Ruiguang Li, Jian Zhao 0011. 227-237 [doi]