Pub Date : 2020-07-10DOI: 10.3969/J.ISSN.1671-1122.2020.07.004
G. Xu
{"title":"Android Malicious Process Identification Method Based on Abnormal Encrypted Traffic Annotation","authors":"G. Xu","doi":"10.3969/J.ISSN.1671-1122.2020.07.004","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.07.004","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-10DOI: 10.3969/J.ISSN.1671-1122.2020.07.003
Xiaoyu Du, He Ye, W. Wen
{"title":"Java Deserialization Vulnerability Gadget Chain Discovery Method Based on Bytecode Search","authors":"Xiaoyu Du, He Ye, W. Wen","doi":"10.3969/J.ISSN.1671-1122.2020.07.003","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.07.003","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116027703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-10DOI: 10.3969/J.ISSN.1671-1122.2020.07.005
Tao Zhang, Bin Lu, Ding Li, Kang He
{"title":"A Host Fingerprint Anti-detection Model Based on SDN","authors":"Tao Zhang, Bin Lu, Ding Li, Kang He","doi":"10.3969/J.ISSN.1671-1122.2020.07.005","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.07.005","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124666183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-10DOI: 10.3969/J.ISSN.1671-1122.2020.06.006
Jiacheng Zhang, Jia Peng, Lei Wang
{"title":"A Graph Information Collection Method Based on Local Differential Privacy in Big Data Environment","authors":"Jiacheng Zhang, Jia Peng, Lei Wang","doi":"10.3969/J.ISSN.1671-1122.2020.06.006","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.06.006","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"65 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121011466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual SDN Network Embedding Algorithm Based on Fruit Fly Optimization","authors":"Jinpeng Ran, Xiang Wang, Shanghong Zhao, Hanghang Gao","doi":"10.3969/J.ISSN.1671-1122.2020.06.008","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.06.008","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126270763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-10DOI: 10.3969/J.ISSN.1671-1122.2020.05.011
Lei Zhang, Jingtao Huang, Tao-Hong Zhang, S. Wang
{"title":"Portrait Intelligent Analysis Application and Algorithm Optimization in Video Investigation","authors":"Lei Zhang, Jingtao Huang, Tao-Hong Zhang, S. Wang","doi":"10.3969/J.ISSN.1671-1122.2020.05.011","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.05.011","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123318408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-10DOI: 10.3969/J.ISSN.1671-1122.2020.05.004
Xuewen Dong, Qihang Liu
{"title":"Research on Trusted QoS-Aware Path Finding and Load Balancing in Service Composition","authors":"Xuewen Dong, Qihang Liu","doi":"10.3969/J.ISSN.1671-1122.2020.05.004","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.05.004","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133396257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-10DOI: 10.3969/J.ISSN.1671-1122.2020.04.006
Rong Wang, C. Ma, Peng Wu
{"title":"An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network","authors":"Rong Wang, C. Ma, Peng Wu","doi":"10.3969/J.ISSN.1671-1122.2020.04.006","DOIUrl":"https://doi.org/10.3969/J.ISSN.1671-1122.2020.04.006","url":null,"abstract":"","PeriodicalId":148259,"journal":{"name":"Netinfo Security","volume":"885 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131306088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}