| [1] | . 
														
															Android Malware Multiclassification Model Based on Transformer
														[J]. Journal of Information Security Reserach, 2023, 9(12): 1138-. | 
																																																																																
													| [2] | . 
														
															Research on Malicious Behavior Detection and Identification Model  Based on Deep Learning
														[J]. Journal of Information Security Reserach, 2023, 9(12): 1152-. | 
																																																																																
													| [3] | . 
														
															Optimal Path Generation Method for Industrial Control System  Penetration Testing Based on Reinforcement Learning
														[J]. Journal of Information Security Reserach, 2023, 9(12): 1159-. | 
																																																																																
													| [4] | . 
														
															Research Status of Smart Contract Security Vulnerabilities#br# 
	#br#
[J]. Journal of Information Security Reserach, 2023, 9(12): 1166-. | 
																																																																																
													| [5] | . 
														
															A Survey of Buffer Overflow Detection Techniques#br# 
	#br#
[J]. Journal of Information Security Reserach, 2023, 9(12): 1180-. | 
																																																																																
													| [6] | . 
														
															Zero Trust IAM Architecture Technology Based on Dynamic Risk #br#
Assessment Mechanism#br#
														[J]. Journal of Information Security Reserach, 2023, 9(12): 1190-. | 
																																																																																
													| [7] | . 
														
															Design and Practice of Open Government Data Platform Based on  Privacypreserving Computation
														[J]. Journal of Information Security Reserach, 2023, 9(12): 1203-. | 
																																																																																
													| [8] | . 
														
															Research on the Practice of DevSecOps in the Construction of  Digital Government
														[J]. Journal of Information Security Reserach, 2023, 9(12): 1210-. | 
																																																																																
													| [9] | . 
														
															Research and Practice on Product Security Governance
														[J]. Journal of Information Security Reserach, 2023, 9(12): 1218-. | 
																																																																																
													| [10] | . 
														
															Data Life Cycle Safety Monitoring Method Driven by Big Data
														[J]. Journal of Information Security Reserach, 2023, 9(12): 1226-. | 
																																																																																
													| [11] | . 
														
															
														[J]. Journal of Information Security Reserach, 2023, 9(E2): 13-. | 
																																																																																
													| [12] | . 
														
															
														[J]. Journal of Information Security Reserach, 2023, 9(E2): 21-. | 
																																																																																
													| [13] | . 
														
															
														[J]. Journal of Information Security Reserach, 2023, 9(E2): 33-. | 
																																																																																
													| [14] | . 
														
															
														[J]. Journal of Information Security Reserach, 2023, 9(E2): 37-. | 
																																																																																
													| [15] | . 
														
															
														[J]. Journal of Information Security Reserach, 2023, 9(E2): 41-. |