Abstract is missing.
- Anomaly detection of traffic session based on graph neural networkPeng Du, Chengwei Peng, Peng Xiang, Qingshan Li. 1-9 [doi]
- Intelligent Penetration Testing in Dynamic Defense EnvironmentQian Yao, YongJie Wang, Xinli Xiong, Yang Li. 10-15 [doi]
- Analysis of Common Vulnerabilities and Exposures to Produce Security TrendsNorman Santiago, Janelli Mendez. 16-19 [doi]
- Pruned-F1DCN: A lightweight network model for traffic classificationRuonan Wang, Jinlong Fei, Rongkai Zhang 0002. 20-24 [doi]
- A symmetric additive homomorphic encryption scheme based on NTRU proxy rekeysWei Liu, Hua Xiao Hao, Lan Ai Wan, Kai Xu, Mu Han, Long Xiao Zhu. 25-33 [doi]
- AI and Fake News: A Conceptual Framework for Fake News DetectionLeila Ameli, Md Shah Alam Chowdhury, Farnaz Farid, Abubakar Bello, Fariza Sabrina, Alana Maurushat. 34-39 [doi]
- Application of static taint analysis in RASP protection strategyMiao Ji, Ming Yin, Ying-hui Zhou. 40-45 [doi]
- Evaluation and Prediction of Network QoS Based on Multidimensional DataMingwei Sun, Qingwei Zhang, Haiyuan Zhao. 46-51 [doi]
- Adaptive Change Technology of Encryption Strength Driven by Network Attack ThreatLan Kun, Ping Kuang, Fan Yang. 52-57 [doi]
- A New Declassification Method for Vector Geographic DataYuxuan Wang, Haowen Yan, LiMing Zhang. 58-62 [doi]
- Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids via a Modified Sensor Measurements ExpressionYu Jian. 63-67 [doi]