Pub Date : 2020-09-10DOI: 10.3969/J.ISSN.1671-1122.2020.09.003
Xin Tong, Luona Wang, Runzheng Wang, Jingya Wang
{"title":"A Generation Method of Word-level Adversarial Samples for Chinese Text Classification","authors":"Xin Tong, Luona Wang, Runzheng Wang, Jingya Wang","doi":"10.3969/J.ISSN.1671-1122.2020.09.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129599508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-10DOI: 10.3969/J.ISSN.1671-1122.2020.09.012
Shibin Li, Jing Li, Gang Tang, Yi Li
{"title":"Method of Network Security States Prediction and Risk Assessment for Industrial Control System Based on HMM","authors":"Shibin Li, Jing Li, Gang Tang, Yi Li","doi":"10.3969/J.ISSN.1671-1122.2020.09.012","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.012","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-10DOI: 10.3969/J.ISSN.1671-1122.2020.09.005
Zhang Runzi, Liu Wenmao, Yang You, Feng Xie
{"title":"Research on AISecOps Automation Levels and Technology Trends","authors":"Zhang Runzi, Liu Wenmao, Yang You, Feng Xie","doi":"10.3969/J.ISSN.1671-1122.2020.09.005","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.005","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133384586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-10DOI: 10.3969/J.ISSN.1671-1122.2020.09.001
Jialing Lu
{"title":"Log Anomaly Detection Method Based on Improved Time Series Model","authors":"Jialing Lu","doi":"10.3969/J.ISSN.1671-1122.2020.09.001","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.09.001","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-10DOI: 10.3969/J.ISSN.1671-1122.2020.08.006
Lu Yuan, Chenlin Huang, Yun Li, Hua Cheng
{"title":"An Active Discovering and Secure Using Method of Hardware Cryptographic Resources Based on TrustZone","authors":"Lu Yuan, Chenlin Huang, Yun Li, Hua Cheng","doi":"10.3969/J.ISSN.1671-1122.2020.08.006","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.08.006","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"160 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-10DOI: 10.3969/J.ISSN.1671-1122.2020.08.005
Yunkun Wu, Bo Jiang, Ruixuan Pan, Yuling Liu
{"title":"A SDN Access Control Mechanism Based on Zero Trust","authors":"Yunkun Wu, Bo Jiang, Ruixuan Pan, Yuling Liu","doi":"10.3969/J.ISSN.1671-1122.2020.08.005","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.08.005","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-10DOI: 10.3969/J.ISSN.1671-1122.2020.08.003
Li Li, Qing-Wei Zeng, Yihong Wen, Shi-Fu Wang
{"title":"Data Sharing Scheme Based on the Blockchain and the Proxy Re-encryption","authors":"Li Li, Qing-Wei Zeng, Yihong Wen, Shi-Fu Wang","doi":"10.3969/J.ISSN.1671-1122.2020.08.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.08.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133534848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}