| [1] |
.
Traffic Feature Obfuscation Method Based on Adversarial Samples
[J]. Journal of Information Security Reserach, 2024, 10(12): 1137-.
|
| [2] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 7-.
|
| [3] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 27-.
|
| [4] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 32-.
|
| [5] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 40-.
|
| [6] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 59-.
|
| [7] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 81-.
|
| [8] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 114-.
|
| [9] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 200-.
|
| [10] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 207-.
|
| [11] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 230-.
|
| [12] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 272-.
|
| [13] |
.
Research for Zero Trust Security Model
[J]. Journal of Information Security Reserach, 2024, 10(10): 886-.
|
| [14] |
.
A Retrospective and Future Development Study of Zero Trust Architecture
[J]. Journal of Information Security Reserach, 2024, 10(10): 896-.
|
| [15] |
.
Design of SDP Trust Evaluation Model Based on Federated Learning
[J]. Journal of Information Security Reserach, 2024, 10(10): 903-.
|