[1] |
.
Android Malware Multiclassification Model Based on Transformer
[J]. Journal of Information Security Reserach, 2023, 9(12): 1138-.
|
[2] |
.
Research on Malicious Behavior Detection and Identification Model Based on Deep Learning
[J]. Journal of Information Security Reserach, 2023, 9(12): 1152-.
|
[3] |
.
Optimal Path Generation Method for Industrial Control System Penetration Testing Based on Reinforcement Learning
[J]. Journal of Information Security Reserach, 2023, 9(12): 1159-.
|
[4] |
.
Research Status of Smart Contract Security Vulnerabilities#br#
#br#
[J]. Journal of Information Security Reserach, 2023, 9(12): 1166-.
|
[5] |
.
A Survey of Buffer Overflow Detection Techniques#br#
#br#
[J]. Journal of Information Security Reserach, 2023, 9(12): 1180-.
|
[6] |
.
Zero Trust IAM Architecture Technology Based on Dynamic Risk #br#
Assessment Mechanism#br#
[J]. Journal of Information Security Reserach, 2023, 9(12): 1190-.
|
[7] |
.
Design and Practice of Open Government Data Platform Based on Privacypreserving Computation
[J]. Journal of Information Security Reserach, 2023, 9(12): 1203-.
|
[8] |
.
Research on the Practice of DevSecOps in the Construction of Digital Government
[J]. Journal of Information Security Reserach, 2023, 9(12): 1210-.
|
[9] |
.
Research and Practice on Product Security Governance
[J]. Journal of Information Security Reserach, 2023, 9(12): 1218-.
|
[10] |
.
Data Life Cycle Safety Monitoring Method Driven by Big Data
[J]. Journal of Information Security Reserach, 2023, 9(12): 1226-.
|
[11] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 13-.
|
[12] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 21-.
|
[13] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 33-.
|
[14] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 37-.
|
[15] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 41-.
|