| [1] |
.
Traffic Anomaly Detection Method by Secondorder Feature
[J]. Journal of Information Security Reserach, 2024, 10(12): 1082-.
|
| [2] |
.
An Adaptive Network Attack Analysis Method Based on Federated Learning
[J]. Journal of Information Security Reserach, 2024, 10(12): 1091-.
|
| [3] |
.
An Effective Website Fingerprinting Defense Utilizing Padding #br#
Based on the Number of Incoming Cells#br#
[J]. Journal of Information Security Reserach, 2024, 10(12): 1100-.
|
| [4] |
.
Traffic Anomaly Detection Based on Improved Pigeon Inspired Optimizer and #br#
Pyramid Convolution#br#
[J]. Journal of Information Security Reserach, 2024, 10(12): 1107-.
|
| [5] |
.
Multifamily Malicious Domain Intrusion Detection Based on #br#
Collaborative Attention#br#
[J]. Journal of Information Security Reserach, 2024, 10(12): 115-.
|
| [6] |
.
A Securityenhanced Circular Text CAPTCHA
[J]. Journal of Information Security Reserach, 2024, 10(12): 1128-.
|
| [7] |
.
Traffic Feature Obfuscation Method Based on Adversarial Samples
[J]. Journal of Information Security Reserach, 2024, 10(12): 1137-.
|
| [8] |
.
A Trust Framework for Large Language Model Application
[J]. Journal of Information Security Reserach, 2024, 10(12): 1153-.
|
| [9] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 2-.
|
| [10] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 7-.
|
| [11] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 27-.
|
| [12] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 32-.
|
| [13] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 40-.
|
| [14] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 45-.
|
| [15] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 54-.
|