Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 201-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-29
代建洪1王永2郑晨璐2高彦恺2张博2杨晓黎3
1(云南省人民防空办公室信息保障中心昆明650228) 2(北京天融信网络安全技术有限公司北京100193) 3(昆明市公安局网安支队昆明650299)
通讯作者:
代建洪
高级工程师.主要研究方向为网络与信息安全.
djh3job@163.com
作者简介:代建洪
高级工程师.主要研究方向为网络与信息安全.
djh3job@163.com
王永
主要研究方向为网络安全、工业信息安全、移动安全.
zfxt_wangyong@topsec.com.cn
郑晨璐
硕士.主要研究方向为网络安全.
zheng_chenlu@topsec.com.cn
高彦恺
主要研究方向为网络安全、数据安全.
731157225@qq.com
张博
博士.主要研究方向为网络安全.
zhang_bo@topsec.com.cn
杨晓黎
硕士,副高级工程师.主要研究方向为公安大数据建模分析.
87794221@qq.com
[1]Yu A, Kolotylo I, Hashim H A, et al. Electronic warfare cyberattacks, countermeasures and modern defensive strategies of UAV avionics: A survey[EBOL]. 2025 [20250910]. https:xueshu.baidu.comndscholarbrowsedetail?paperid=1t230xe0ra2g0jp0xn1u0t60xj684727[2]Ouadah M, Merazka F. Securing UAV communication: Authentication and integrity[EBOL]. 2024 [20250910]. https:xueshu.baidu.comndscholarbrowsedetail?paperid=1d740tv0t22s0mk06w1e0rt0cn444504[3]Renu Y, Sarveshwaran V. A review of cyber security challenges and solutions in unmanned aerial vehicles (UAVs)[J]. Inteligencia Artificial, 2025, 28(75): 199219[4]Amorim A, Taylor M, Kann T, et al. UAV resilience against stealthy attacks[EBOL]. 2025 [20250910]. https:xueshu.baidu.comndscholarbrowsedetail?paperid=1x7s0090ya5h06b0cr7m0g30ee694822[5]Lyu Z, Gao Y, Chen J, et al. Empowering intelligent lowaltitude economy with large ai model deployment[EBOL]. 2025 [20250910]. https:xueshu.baidu.comndscholarbrowsedetail?paperid=1j0y0vw0yk2w0cu0wc400000w339 9431 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||