Abstract is missing.
- Practical Metrics for Evaluating Anonymous NetworksZhi Wang, Jinli Zhang, Qixu Liu, Xiang Cui, Junwei Su. 3-18 [doi]
- Influence of Clustering on Network Robustness Against Epidemic PropagationYinwei Li, Zhen-Hao Zhang, Dongmei Fan, Yurong Song, Guo-Ping Jiang. 19-33 [doi]
- An Attack Graph Generation Method Based on Parallel ComputingNingyuan Cao, Kun Lv, Changzhen Hu. 34-48 [doi]
- A Note on Dependence of Epidemic Threshold on State Transition Diagram in the SEIC Cybersecurity Dynamical System ModelHao Qiang, Wenlian Lu. 51-64 [doi]
- Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited ResourcesDingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia, Yuantian Zhang. 65-80 [doi]
- Computer Viruses Propagation Model on Dynamic Switching NetworksChunming Zhang. 81-95 [doi]
- Advanced Persistent Distributed Denial of Service Attack Model on Scale-Free NetworksChunming Zhang, Junbiao Peng, Jingwei Xiao. 96-112 [doi]
- Security and Protection in Optical NetworksQingshan Kong, Bo Liu. 115-125 [doi]
- H-Verifier: Verifying Confidential System State with Delegated SandboxesAnyi Liu, Guangzhi Qu. 126-140 [doi]
- Multi-party Quantum Key Agreement Against Collective NoiseXiang-Qian Liang, Sha-sha Wang, Yong-hua Zhang, Guang-Bao Xu. 141-155 [doi]
- An Inducing Localization Scheme for Reactive Jammer in ZigBee NetworksKuan He, Bin Yu. 156-171 [doi]
- New Security Attack and Defense Mechanisms Based on Negative Logic System and Its ApplicationsYexia Cheng, Yuejin Du, Jin Peng, Shen He, Jun Fu, Baoxu Liu. 172-180 [doi]
- Establishing an Optimal Network Defense System: A Monte Carlo Graph Search MethodZhengyuan Zhang, Kun Lv, Changzhen Hu. 181-190 [doi]
- CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship SystemsRishikesh Sahay, D. A. Sepulveda, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod. 191-198 [doi]
- A Security Concern About Deep Learning ModelsJiaxi Wu, Xiaotong Lin, Zhiqiang Lin, Yi Tang. 199-206 [doi]
- Defending Against Advanced Persistent Threat: A Risk Management PerspectiveXiang Zhong, Luxing Yang, Xiaofan Yang, Qingyu Xiong, Junhao Wen, Yuan Yan Tang. 207-215 [doi]
- Economic-Driven FDI Attack in Electricity MarketDatian Peng, Jianmin Dong, Jianan Jian, Qinke Peng, Bo Zeng, Zhi-Hong Mao. 216-224 [doi]