Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 205-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-29
闫雪1张柏恺1,2段伟恒2
1(公安部第一研究所北京100080) 2(北京天防安全科技有限公司北京100080)
通讯作者:
闫雪
硕士,副研究员.主要研究方向为视频安全.
yanxue023454@163.com
作者简介:闫雪
硕士,副研究员.主要研究方向为视频安全.
yanxue023454@163.com
张柏恺
硕士,研究实习员.主要研究方向为网络安全.
zbk_bobo123@163.com
段伟恒
硕士.主要研究方向为网络安全.
jump_dwh@163.com
[1]Godfrey M W, Tu Q, et al. Evolution in open source software: A case study[EBOL]. 2001[20250913]. https:xueshu.baidu.comndscholarbrowsedetail?paperid=1m7f0ec0uw3p0pk0dn4f02g0cn412571&site=xueshu_se[2]Huang X, Qin Z, Liu H. A survey on power grid cyber security: From componentwise vulnerability assessment to systemwide impact analysis[EBOL]. 2018 [20250913]. https:ieeexplore.ieee.orgstampstamp.jsp?tp=&arnumber=8528321[3]纪守领, 王琴应, 陈安莹, 等. 开源软件供应链安全研究综述[J]. 软件学报, 2022, 34(3): 13301364[4]龙翔, 崔宝江, 吴佳桐. 一种UEFI DXE驱动二进制模糊测试方法[J]. 北京邮电大学学报, 2023, 46(1): 121[5]郑尧文, 文辉, 程凯, 等. 物联网安全威胁与安全模型[J]. 信息安全学报, 2023, 8(5): 8195[6]Feng X, Zhu X, Han Q L, et al. Detecting vulnerability on IoT device firmware: A survey[J]. IEEECAA Journal of Automatica Sinica, 2022, 10(1): 2541 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||