基于机器学习的软件漏洞挖掘方法综述 https://dl.ccf.org.cn/file_server/20200804/125_34_55_24/rjxb7/0a22b14b896a48f2901554753d11cc93.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5041210218874880
Security Attacks in Named Data Networking: A Review and Research Directions /upload/resources/image/2022/03/25/187130_500x500.png 2022-03-25
https://jcst.ict.ac.cn/EN/10.1007/s11390-019-1978-9
An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion /upload/resources/image/2022/03/25/187131.png 2022-03-25
https://jcst.ict.ac.cn/EN/10.1007/s11390-019-1979-8
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks /upload/resources/image/2022/03/25/187132.png 2022-03-25
https://jcst.ict.ac.cn/EN/10.1007/s11390-019-1961-5
A Survey on the Moving Target Defense Strategies: An Architectural Perspective /upload/resources/image/2022/03/25/187133.png 2022-03-25
https://jcst.ict.ac.cn/EN/10.1007/s11390-019-1906-z
互联网内生安全体系结构研究进展 https://dl.ccf.org.cn/file_server/20220120/159_226_43_8/JSJXB11/ecb34b0525324faab68afdd2cdcfdc4e.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5797192775829504
基于机器学习的KDD-CUP99网络入侵检测数据集的分析 /upload/resources/image/2022/03/25/187144.png 2022-03-25
http://manu46.magtech.com.cn/ces/CN/abstract/abstract16200.shtml
改进的HS算法优化BP神经网络的入侵检测研究 https://dl.ccf.org.cn/file_server///upload/image/20220325/1648169896983094909.png 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=4446328186800128