Open Access
ARTICLE
Xiangbin Wang1, Qingjun Yuan1,*, Weina Niu2, Qianwei Meng1, Yongjuan Wang1, Chunxiang Gu1
1 Henan Key Laboratory of Network Cryptography Technology, Information Engineering University, Zhengzhou, 450001, China
2 School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China
* Corresponding Author: Qingjun Yuan. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.061767
Received 02 December 2024; Accepted 24 January 2025; Published online 19 February 2025
View
Download
Like
Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
Chak Fong Cheang, Yiqin Wang,...MSICST: Multiple-Scenario Industrial Control System Testbed for Security Research
Wei Xu, Yaodong Tao, Chunfang...MalDetect: A Structure of Encrypted Malware Traffic Detection
Jiyuan Liu, Yingzhi Zeng, Jiangyong...